Font Size: a A A

The Design And Implementation Of Secret Carrier Full Lifecycle Management Prototype System

Posted on:2016-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:C X ZhangFull Text:PDF
GTID:2298330467993749Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of information technology, e-government, office automation and other IT applications in information processing, transmission and interaction increasingly rely on a variety of tangible information carrier. How to effectively control all kinds of physical information carriers, to avoid leaks caused due to mismanagement risks and hazards, the project has become one of the urgent need for information security research.The use of the secret project lifecycle management support in mainstream categories tangible information carrier (paper media, CD-ROM) and control analysis of the problem, focusing on ways to achieve the secret support the safe use of technology and management and control, design and implement a secret carrier lifecycle management prototype system designed to support a comprehensive analysis of the secret security management and control needs, provide effective technical support for the entire life cycle of the carrier secret security management and control, in order to reduce the risk of paper media or optical carrier leakage, and eventually eliminate involved confidential information leakage risks carrier to provide technical support and tools. For the current carrier management secret military, government departments, secret units has a very important value and significance. The main work of this thesis is as follows:The demanding analysis of secret carrier management systemEffective development of a management system is inseparable without detailed requiremental analysis. In analyzing secret carrier management status and security risks on the basis of existing, proposed functional requirements and non-functional requirements secret carrier lifecycle management system design goals, system analysis, design and implementation of the follow-up to lay the foundation for the system, but also to verify the validity of the system provided.Research of secret identity verification vectors and access controlCombined with the carrier secret Lifecycle Management actual demand, the system is applied to the two-dimensional code technology, DES encryption and decryption technology, print monitoring technology, three key technologies for detailed analysis, and application of three techniques in the management system and implementation of research, research on key technologies subsequent detailed design and implementation of the management system of the foundation.The overall architecture of classified prototype vehicle management systemThe overall management system architecture based on distributed software architecture message bus, to achieve separation of applications and services. Database is Server2008, according to the database conceptual design, logical design ideas, designed data entities and database tables.The establishment of a data base for future system development structure.Development and implementation of a prototype system secret carrier managementSecret prototype vehicle management system is the carrier control technique practical requiremen. The project management system using CS, BS combination of software development, in the spirit of friendly, easy to use interface design principles, ideas utilizing various process control design workflow, according to the system requirements analysis completed four functional management system development and implementation of the module.
Keywords/Search Tags:secret carrier, full lifecycle, security control, prototype system
PDF Full Text Request
Related items