天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁 > 管理論文 > 項目管理論文 >

涉密載體全生命周期管理原型系統(tǒng)的設(shè)計與實現(xiàn)

發(fā)布時間:2018-03-09 03:11

  本文選題:涉密載體 切入點:全生命周期 出處:《中國科學(xué)院大學(xué)(工程管理與信息技術(shù)學(xué)院)》2015年碩士論文 論文類型:學(xué)位論文


【摘要】:隨著信息化技術(shù)的發(fā)展,電子政務(wù)、辦公自動化等信息技術(shù)應(yīng)用中的信息處理、傳遞、交互過程越來越多地依賴于多種有形的信息載體進(jìn)行,如何有效地管控各類有形信息載體,降低載體使用安全風(fēng)險,成為信息安全領(lǐng)域迫切需要研究的課題。本項目對涉密載體全生命周期管理中的兩類主流有形信息載體(紙介質(zhì)、光盤)的使用與管控問題進(jìn)行分析,重點探討實現(xiàn)涉密載體安全使用與管控的技術(shù)途徑,設(shè)計并實現(xiàn)一個涉密載體全生命周期管理原型系統(tǒng),旨在全面分析涉密載體安全管控需求,為涉密載體全生命周期安全管控提供有效的技術(shù)支持與工具支撐。對于目前軍隊、政府部門、涉密單位的涉密載體管理具有非常重要的應(yīng)用價值與指導(dǎo)意義。論文的主要工作具體如下: 涉密載體管理系統(tǒng)的需求分析 一個管理系統(tǒng)的有效開發(fā)離不開詳細(xì)、系統(tǒng)的需求分析。在分析涉密載體管理現(xiàn)狀與現(xiàn)存安全隱患的基礎(chǔ)上,提出涉密載體全生命周期管理系統(tǒng)總體設(shè)計目標(biāo),分析系統(tǒng)的功能需求及非功能性需求,為后續(xù)系統(tǒng)的設(shè)計與實現(xiàn)打下基礎(chǔ),也為系統(tǒng)的有效性驗證提供了依據(jù)。 涉密載體身份識別與訪問控制技術(shù)研究 結(jié)合涉密載體全生命周期管理實際的需求,對系統(tǒng)應(yīng)用到的二維碼技術(shù)、DES加解密技術(shù)、打印監(jiān)控技術(shù)等三種關(guān)鍵技術(shù)進(jìn)行詳細(xì)分析,并對三種技術(shù)在管理系統(tǒng)中的應(yīng)用與實現(xiàn)進(jìn)行研究,關(guān)鍵技術(shù)的研究對后續(xù)管理系統(tǒng)的詳細(xì)設(shè)計及實現(xiàn)打下了基礎(chǔ)。 涉密載體管理原型系統(tǒng)的總體架構(gòu)設(shè)計 管理系統(tǒng)總體架構(gòu)設(shè)計采用基于消息總線的分布式軟件體系架構(gòu),實現(xiàn)應(yīng)用與服務(wù)的分離。數(shù)據(jù)庫采用Server2008,按照數(shù)據(jù)庫概念設(shè)計、邏輯結(jié)構(gòu)設(shè)計的思路進(jìn)行數(shù)據(jù)庫設(shè)計,為后續(xù)系統(tǒng)開發(fā)建立了數(shù)據(jù)結(jié)構(gòu)基礎(chǔ)。 涉密載體管理原型系統(tǒng)的開發(fā)與實現(xiàn) 系統(tǒng)是載體管控技術(shù)實用化的必要條件,本項目管理系統(tǒng)采用CS、BS目結(jié)合的方式進(jìn)行軟件開發(fā),本著友好、易用的原則進(jìn)行界面設(shè)計,利用流程控制的思想設(shè)計各個工作流程,按照系統(tǒng)需求分析完成了管理系統(tǒng)的四個功能模塊的開發(fā)與實現(xiàn)。
[Abstract]:With the development of information technology, the process of information processing, transmission and interaction in the application of information technology, such as e-government, office automation and so on, is more and more dependent on a variety of tangible information carriers. How to effectively control all kinds of tangible information carriers and reduce the risk of using them has become an urgent research topic in the field of information security. The use and control of CD) are analyzed, and the technical ways to realize the safe use and control of the secret carrier are discussed, and a prototype system of the whole life cycle management of the secret carrier is designed and implemented. The purpose of this paper is to comprehensively analyze the security control requirements of the secret carrier, and provide effective technical support and tool support for the security control of the whole life cycle of the secret carrier. The carrier management of secret units has very important application value and guiding significance. The main work of this paper is as follows:. Requirement Analysis of Confidential Carrier Management system. The effective development of a management system can not be separated from the detailed and systematic requirement analysis. On the basis of analyzing the current situation of the management of the secret carrier and the existing hidden dangers of security, the overall design goal of the whole life cycle management system of the secret carrier is put forward. The analysis of the functional and non-functional requirements of the system lays a foundation for the design and implementation of the subsequent system and provides a basis for the verification of the effectiveness of the system. Research on identity Identification and access Control Technology of Secrets Carrier. Combined with the actual requirement of the whole life cycle management of the secret carrier, the paper analyzes in detail three key technologies, such as the two-dimension code technology, the encryption and decryption technology and the printing and monitoring technology, which are applied in the system. The application and realization of the three technologies in the management system are studied. The research of the key technology lays a foundation for the detailed design and implementation of the follow-up management system. General Architecture Design of Confidential Carrier Management prototype system. The overall architecture design of the management system is based on the distributed software architecture based on message bus, which realizes the separation of application and service. The database adopts Server 2008, and the database is designed according to the concept of database and logic structure. The data structure foundation is established for the subsequent system development. Development and implementation of a prototype system for Confidence-Related Carrier Management. The system is a necessary condition for the practical application of carrier control technology. The project management system adopts the method of combining CSB and BS for software development, carries out interface design based on friendly and easy-to-use principle, and designs each workflow using the idea of flow control. According to the system requirement analysis, the development and implementation of the four functional modules of the management system are completed.
【學(xué)位授予單位】:中國科學(xué)院大學(xué)(工程管理與信息技術(shù)學(xué)院)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2015
【分類號】:TP311.52

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 劉兆存;范瑋佳;;軟件過程中可復(fù)用需求分析[J];重慶理工大學(xué)學(xué)報(自然科學(xué));2012年01期

2 張帆;朱國仲;;多線程打印機(jī)監(jiān)控系統(tǒng)[J];福建電腦;2008年01期

3 楊力銘;劉煒;;涉密內(nèi)網(wǎng)中的移動存儲介質(zhì)管理問題及對策[J];甘肅科技;2010年02期

4 宗河;;這幾起泄密事件警示我們[J];秘書工作;2008年06期

5 姜建國;;保密科學(xué)與保密技術(shù)漫談[J];保密科學(xué)技術(shù);2010年01期

6 袁藝;王憲嶸;李宇慶;;物聯(lián)網(wǎng)時代信息安全形勢更趨嚴(yán)峻[J];保密工作;2011年08期

7 李杰;;美國統(tǒng)計數(shù)據(jù)保密管理的經(jīng)驗與啟示[J];保密工作;2011年10期

8 竇勤穎,姚青;條碼技術(shù)的發(fā)展及其應(yīng)用[J];計算機(jī)工程與科學(xué);2003年05期

9 張予民;萬洪彬;;淺談SQL Server數(shù)據(jù)庫應(yīng)用技巧[J];科技廣場;2009年05期

10 王怡;佘新荷;張石狀;;基于RFID技術(shù)的涉密載體動態(tài)安全管理系統(tǒng)[J];信息技術(shù);2012年07期

,

本文編號:1586727

資料下載
論文發(fā)表

本文鏈接:http://www.sikaile.net/guanlilunwen/xiangmuguanli/1586727.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶a4c7d***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com