当前位置:主页 > 管理论文 > 项目管理论文 >

涉密载体全生命周期管理原型系统的设计与实现

发布时间:2018-03-09 03:11

  本文选题:涉密载体 切入点:全生命周期 出处:《中国科学院大学(工程管理与信息技术学院)》2015年硕士论文 论文类型:学位论文


【摘要】:随着信息化技术的发展,电子政务、办公自动化等信息技术应用中的信息处理、传递、交互过程越来越多地依赖于多种有形的信息载体进行,如何有效地管控各类有形信息载体,降低载体使用安全风险,成为信息安全领域迫切需要研究的课题。本项目对涉密载体全生命周期管理中的两类主流有形信息载体(纸介质、光盘)的使用与管控问题进行分析,重点探讨实现涉密载体安全使用与管控的技术途径,设计并实现一个涉密载体全生命周期管理原型系统,旨在全面分析涉密载体安全管控需求,为涉密载体全生命周期安全管控提供有效的技术支持与工具支撑。对于目前军队、政府部门、涉密单位的涉密载体管理具有非常重要的应用价值与指导意义。论文的主要工作具体如下: 涉密载体管理系统的需求分析 一个管理系统的有效开发离不开详细、系统的需求分析。在分析涉密载体管理现状与现存安全隐患的基础上,提出涉密载体全生命周期管理系统总体设计目标,分析系统的功能需求及非功能性需求,为后续系统的设计与实现打下基础,也为系统的有效性验证提供了依据。 涉密载体身份识别与访问控制技术研究 结合涉密载体全生命周期管理实际的需求,对系统应用到的二维码技术、DES加解密技术、打印监控技术等三种关键技术进行详细分析,并对三种技术在管理系统中的应用与实现进行研究,关键技术的研究对后续管理系统的详细设计及实现打下了基础。 涉密载体管理原型系统的总体架构设计 管理系统总体架构设计采用基于消息总线的分布式软件体系架构,实现应用与服务的分离。数据库采用Server2008,按照数据库概念设计、逻辑结构设计的思路进行数据库设计,为后续系统开发建立了数据结构基础。 涉密载体管理原型系统的开发与实现 系统是载体管控技术实用化的必要条件,本项目管理系统采用CS、BS目结合的方式进行软件开发,本着友好、易用的原则进行界面设计,利用流程控制的思想设计各个工作流程,按照系统需求分析完成了管理系统的四个功能模块的开发与实现。
[Abstract]:With the development of information technology, the process of information processing, transmission and interaction in the application of information technology, such as e-government, office automation and so on, is more and more dependent on a variety of tangible information carriers. How to effectively control all kinds of tangible information carriers and reduce the risk of using them has become an urgent research topic in the field of information security. The use and control of CD) are analyzed, and the technical ways to realize the safe use and control of the secret carrier are discussed, and a prototype system of the whole life cycle management of the secret carrier is designed and implemented. The purpose of this paper is to comprehensively analyze the security control requirements of the secret carrier, and provide effective technical support and tool support for the security control of the whole life cycle of the secret carrier. The carrier management of secret units has very important application value and guiding significance. The main work of this paper is as follows:. Requirement Analysis of Confidential Carrier Management system. The effective development of a management system can not be separated from the detailed and systematic requirement analysis. On the basis of analyzing the current situation of the management of the secret carrier and the existing hidden dangers of security, the overall design goal of the whole life cycle management system of the secret carrier is put forward. The analysis of the functional and non-functional requirements of the system lays a foundation for the design and implementation of the subsequent system and provides a basis for the verification of the effectiveness of the system. Research on identity Identification and access Control Technology of Secrets Carrier. Combined with the actual requirement of the whole life cycle management of the secret carrier, the paper analyzes in detail three key technologies, such as the two-dimension code technology, the encryption and decryption technology and the printing and monitoring technology, which are applied in the system. The application and realization of the three technologies in the management system are studied. The research of the key technology lays a foundation for the detailed design and implementation of the follow-up management system. General Architecture Design of Confidential Carrier Management prototype system. The overall architecture design of the management system is based on the distributed software architecture based on message bus, which realizes the separation of application and service. The database adopts Server 2008, and the database is designed according to the concept of database and logic structure. The data structure foundation is established for the subsequent system development. Development and implementation of a prototype system for Confidence-Related Carrier Management. The system is a necessary condition for the practical application of carrier control technology. The project management system adopts the method of combining CSB and BS for software development, carries out interface design based on friendly and easy-to-use principle, and designs each workflow using the idea of flow control. According to the system requirement analysis, the development and implementation of the four functional modules of the management system are completed.
【学位授予单位】:中国科学院大学(工程管理与信息技术学院)
【学位级别】:硕士
【学位授予年份】:2015
【分类号】:TP311.52

【参考文献】

相关期刊论文 前10条

1 刘兆存;范玮佳;;软件过程中可复用需求分析[J];重庆理工大学学报(自然科学);2012年01期

2 张帆;朱国仲;;多线程打印机监控系统[J];福建电脑;2008年01期

3 杨力铭;刘炜;;涉密内网中的移动存储介质管理问题及对策[J];甘肃科技;2010年02期

4 宗河;;这几起泄密事件警示我们[J];秘书工作;2008年06期

5 姜建国;;保密科学与保密技术漫谈[J];保密科学技术;2010年01期

6 袁艺;王宪嵘;李宇庆;;物联网时代信息安全形势更趋严峻[J];保密工作;2011年08期

7 李杰;;美国统计数据保密管理的经验与启示[J];保密工作;2011年10期

8 窦勤颖,姚青;条码技术的发展及其应用[J];计算机工程与科学;2003年05期

9 张予民;万洪彬;;浅谈SQL Server数据库应用技巧[J];科技广场;2009年05期

10 王怡;佘新荷;张石状;;基于RFID技术的涉密载体动态安全管理系统[J];信息技术;2012年07期



本文编号:1586727

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/xiangmuguanli/1586727.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户a4c7d***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com