Font Size: a A A

The Research Of Safety Mode Of E-Government Affairs Based On PKI And PMI

Posted on:2015-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:F ShiFull Text:PDF
GTID:2308330473453290Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the fast developing of E-government, more and more government or business institutions begin to use network resource to do their office work, this has largely elevated the work’s efficiency and validity. E-government has contained more information and more features were added into it to provide better services. But it is also facing more serious threat of network security than before. How to build a high-security security system to ensure E-government’s safety and efficient operation has become a key factor for the development of e-government.The security system, which based on PKI/PMl, is a common E-government security technique. PKI/PMl system is the core of E-government, and it belongs to the reliable infrastructure layer of E-government.The thesis focuses on users’ identity authentication and authority management issues. The supply, storage, management of attribute certificate and the encryption, security, digital signature of information are realized by using the PKI/PMI technology. And this kind of technology also maintains and establishes a unified system of mutual trust. The deeply centralized management of users’ identities, the users’ access rights settings, and series of audit technologies is guaranteed based on the PKI/PMI technology, which provides complex and manageable security technology for E-government system.At first, the security issues of E-government in the application process are described in this paper in detail, the security demand of E-government system is analyzed, the composition of the core technology PKI/PMI system model is given, and a safe architecture of E-government system based on PKI/PMI technology is proposed. All of which provide a theoretical basis for solving the society problems subsist in E-government system. Then, the components of PKI/PMI technology is practiced after they are designed and implemented in detailed. Finally, the security system that researched in this paper is tested in my company, the testing procedures and results are showed at the end of the paper.
Keywords/Search Tags:E-government, information security, PKI/PMI, authentication, access control
PDF Full Text Request
Related items