Font Size: a A A

Research Of Applying PKI Based Network Security Technology In E-government

Posted on:2015-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2308330464470256Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and communication technology, Internet has been so much widely used. As a result, we are witnessing that the process of informationization is advancing rapidly anywhere, as well as the full swing of network based new economy. However, in the era of information, orderly and healthy development of society and economy must be guaranteed by an orderly environment. There is no doubt that the government bears the responsibility by supervising, managing and provide necessary services, so as to ensure all related aspects running well. Therefore, e-government not only becomes the "leader " of the journey of information society development, but also is the new opportunity to speed up the modernization process of the whole nation. Security of E-government information not only reflects the image of the country and the government, but also relates to the safety and stability. Once attacked, the government will suffer unpredictable consequences. It is why it is theoretical and practical important to conduct study of e-government security, particularly, about the applica tion of PKI technology in e-government.In this paper, the main target is to conduct research and implement a certification system based e-government security system, which also leverages traditional security technology. The system is based on e-government security, PKI technology, and helps to meet security requirements of current e-government system. Firstly, there will be description of realistic needs of e-government development, and then introduces background and significance of the selected topic, as well as reviews related research both at home and abroad, outline, main content and structure of the paper. In the second part, there will be detailed definition to e-government and security technologies. In the third part, PKI technology is explained in detail, which lays the foundation to the designs of safety system. The fourth part is about the interpretation of CA security system. By analyzing security threats analysis and risks to e-government, this part focuses on demand analysis of e- government security, and sets the objectives of e-government security development, conduct detailed researches to the security of system. The fifth part mainly schemes the design of e-government systems to realize all levels of design features.. The sixth part is about description of system functions and design of database etc. Finally, there is the summary to main research of this paper and presents a outlook for the future study.
Keywords/Search Tags:digital signatures, PKI, technologyelectronic signatureshe amount of e-government
PDF Full Text Request
Related items