Welcome to Journal of Beijing Institute of Technology
Volume 11Issue 2
.
Turn off MathJax
Article Contents
LI Xiao ping, ZHONG Hong, DING Yan, XIANG Zhi, HU Hai sheng, WU Xue lin, ZHANG Qi, ZHU Jian xue. Security of Application System[J]. JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2002, 11(2): 198-202.
Citation: LI Xiao ping, ZHONG Hong, DING Yan, XIANG Zhi, HU Hai sheng, WU Xue lin, ZHANG Qi, ZHU Jian xue. Security of Application System[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2002, 11(2): 198-202.

Security of Application System

Funds:SponsoredbytheProjectofCASystemfortheBank
  • Received Date:2001-09-22
  • A safe and reliable application system frame based on Internet and Intranet for Stock Supervision and Administration Council of China is built up. An all sided, multi tier and multi technical security method has been adopted, which includes identity recognition, data encryption, digital signature, Domino and WWW servers, access control list, directory service, certificate authorization server, IC card and so on. The recognition system based on CA server is a high efficient, convenient and reliable system. The encryption technology and security method are proved to be reliable. The recognition system is of high security and is worthy of being popularized in some places where some special security requirements need meeting. Multi tier technology can improve the security of database. Double keys method is a useful data encryption method.
  • loading
  • [1]
    Weber A.F ull bindingness and confidentiality:r equirements for secure computers,and desig n options[Z]. Conference of ECIS 2000,Berlin:2000.889-896.
    [2]
    Stuble C.Dev elo pment of a prototype for a securit y platform for mobile devices[M]. Saarbr%ucken:Dortmund,2000.
    [3]
    Stallings W.Networ k and inter networ k securit y principles and practice[M]. EngleW ood:Cliffs,N J:P renticeHall,1995.
    [4]
    Chapman D B,Zwicky E D.Building I nternet fir ew alls.2nd ed[M]. Ber lin:O Reilly&Associates I nc.,2000.
    [5]
    Weber A,T r igila S,Mullery A.See w hat y ou sign:secure implementations of digital signatures[A]. Intelligence in Services and N etworks:T echnology for U biquitous T elecom Services[M]. Berlin:Springer V erlag,1998.509-520.
  • 加载中

Catalog

    通讯作者:陈斌, bchen63@163.com
    • 1.

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (330) PDF downloads(24) Cited by()
    Proportional views
    Related

    /

      Return
      Return
        Baidu
        map