Font Size: a A A

The Design And Implementation Of Classified Information Security Management System

Posted on:2015-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:X Y ZuoFull Text:PDF
GTID:2308330482976828Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous development of information technology, e-government system is more and more mature, and the scope of application is more and more widely, so it greatly improved office efficiency and the ability to service the public. As the information security problem is increasingly highlight, however, the safety of the classified information gradually become the prominent contradiction in the process of e-government electronic information. Especially as a sector with high grade classified demand, it is lacking of an information system that can solve information security problem, achieve high efficiency, and accord with the actual requirement of usage. Traditional units and departments with confidentiality requirements are actively to explore the informationization and information sharing system, which under the information security condition.In this paper, a certain confidential requirement of a government authority (later referred to as a unit) as an example, basing on the cryptography, combining PKI/CA digital envelope encryption technology, use encrypted file sharing technology and "safe" classified information technology as the core of classified information security management system, and design a secure management system, that in order to solve the storage, exchange, and file sharing of electronic document, and put forward implement of a complete set of The system based on PKI/CA technology, using asymmetric encryption algorithm, and realized the confidential document encryption storage, sharing, exchange of authorization and encryption transmission, department platform roaming, and other functions.In this paper, the main job is:(1) In combination with PKI/CA technology and encryption technology, digital envelope classified information security management model is put forward, and the security of the models are analyzed.(2) To meet the needs of a unit classified work, the existing information security technology and classified information security management model, to make the design of the electronic document security management system.(3) According to the design of the electronic document security management system, from hardware construction, data interface, interface design, expounds how to implement classified the electronic document security management system. On the system database design, and puts forward the "concurrency control" and "file upload file damaged unexpectedly to handle" the key implementation techniques such as solution. Using the Visual c++ language, under the Windows environment, combined with SQL Server 2000 database, through the file Server and network in the form of a safe, classified the electronic document security management system for the Server and the client.This paper introduces the background, the application of basic theory, system design, system implementation and application of the results. This system, on the basis of centralized storage, has realized the implementation process of the draft, the full name of the end draft encryption management, clear the access to and scope, and provides a convenient shared channel of confidential information in accordance with the requirements of the classified units. It can be implemented in accordance with the owner of the information to point to a clear mandate, ensure the security of information, provide the process of document flow after detailed audit, can trace the whole process of document flow and involved in every detail of each user. It is certified by the relevant department, and it can conform to the requirements of the national secrecy departments to deal with most confidential documents. It provides an effective way to ensure information security, and efficient flow of information for classified unit.
Keywords/Search Tags:Personal digital certificate, Information security, Network storage
PDF Full Text Request
Related items