Advanced Search
Volume 29 Issue 5
Jan.  2011
Turn off MathJax
Article Contents
Wang Kun, Yin Zhong-hai, Zhou Li-hua, Yuan Feng. Study on Complicated Information System Support Platform[J]. Journal of Electronics & Information Technology, 2007, 29(5): 1215-1219. doi: 10.3724/SP.J.1146.2005.01685
Citation: Wang Kun, Yin Zhong-hai, Zhou Li-hua, Yuan Feng. Study on Complicated Information System Support Platform[J]. Journal of Electronics & Information Technology, 2007, 29(5): 1215-1219. doi: 10.3724/SP.J.1146.2005.01685

Study on Complicated Information System Support Platform

doi: 10.3724/SP.J.1146.2005.01685
  • Received Date: 2005-12-26
  • Rev Recd Date: 2006-07-24
  • Publish Date: 2007-05-19
  • It is crucial to make Complicated Information System (CIS) secure, interoperable, extensible and controllable. This paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS. It divides CIS into layers to reduce system complexity. Web service is adopted to fulfill interoperability and extensibility. It uses encryption support layer, security protection and reliability support layer to guarantee system security and stability. It uses system management layer to interact with other layers to make CIS administrable. A case study with performance statistic and network simulation show the model can satisfy the need of e-government without interfere with system performance. This model is apt to security-critical environment such as government, military and bank. Been properly simplified, it can be applied to relative simple information system too.
  • loading
  • Shnitko A. Adaptive security in complex information systems[C]. Proceedings of the 7th Korea-Russia International Symposium on Science and Technology, Ulsan, South Korea, 2003: 206-210.[2]李守鹏, 孙红波. 信息系统安全模型研究[J]. 电子学报, 2003, 31(10): 1491-1495.[3]Zhou B Y. Security analysis and the DSM model[C]. Proceedings of 13th International Workshop on Database and Expert Systems Applications, Aix-en-Provence, France, 2002: 17-21.[4]Hripcsak G. IAIMS Architecture[J]. Journal of the American Medical Informatics Association, 1997, 4(2): S20-S30.[5]Lee S Y and Koh J S. WWW-based reliability information system[J].Computers Industrial Engineering.1998, 35(3 4):599-602[6]Chou S C T. Migrating to the web: A web financial information system server[J].Decision Support Systems.1998, 23(1):29-40[7]Van R and de Velde. Framework for a clinical information system[J].International Journal of Medical Informatics.2000, 57(1):57-72[8][8] XML在电子政务中的应用指南[S]. 2005, GB/Z 19669-2005.[9][9] 信息技术设备的安全[S]. 2001, GB 4943-2001.[10][10] 路由器安全技术要求[S]. 1999, GB/T 18018-1999.[11][11] 信息技术包过滤防火墙安全技术要求[S]. 1999, GB/T 18019-1999.[12][12] 信息技术应用级防火墙安全技术要求[S]. 1999, GB/T 18020-1999.[13]朱鲁华, 施军, 沈昌祥. 涉密网的物理隔离问题[J]. 电子计算机, 2002, 154: 16-19.[14]Wang K, Su R D, and Li Z X, et al.. Robust disaster recovery system model[J].Wuhan University Journal of Natural Sciences.2006, 11(1):170-174[15]Grimaila M R. Maximizing business information security's educational value[J].IEEE Security Privacy Magazine.2004, 2(1):56-60[16]刘权. 我国电子政务发展现状与趋势[J]. 中国信息导报, 2004, 12: 21-23.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3175) PDF downloads(1066) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return