Font Size: a A A

Design And Implementation Of Web-Based E-Mail Protection Classification System

Posted on:2012-09-09Degree:MasterType:Thesis
Country:ChinaCandidate:K Z WangFull Text:PDF
GTID:2218330338953039Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of information technology and network technology, most of corporation handle their official business work increasingly rely on various information systems, therein the most important and the most widely used is e-mail system.In recent years, the ideas of protection information with grade have been gradually accepted by Domestic information-based build and manage department. In order to manage the use of secret electronic information better, have different security classification of electronic information can be transfer between with the persons who appointed has homologous security classification, establishment a secure email system, ensure secret electronic documents only can be transferred between the persons who has homologous security classification, prevent to blow the gaff.For request of classification protect information from the National, build the software system with more reasonable way to protect corresponding information, have a great significance.This discourse advance the aim that dispose secure mail system in third class units, increase the request of security function for identity authentication, access control and control the Irregularities dealing that high secret reveal to low level; at the same time, enlarge some function in order to convenient for management. Including high-capacity attachment transmission, global address book and B/S interface; advance the request for classification dispose this system in head office branch office and third class units. This system adopt J2EE frame platform, Oracle database, B/S framework to design the web email system that based on the idea of classification protect. In the division of the system level, using three level software system frame and unified interface model to complete the design of this system.
Keywords/Search Tags:Classification Protect, E-Mail, Identity Authentication, Security Audit
PDF Full Text Request
Related items