Network Security Management System Based on Digital China

Article Preview

Abstract:

With the popularity of the Internet, web applications have become an essential part of business development. At the same time, network security issues have become increasingly prominent, enterprises feel the convenience brought by the network, while they are also facing a variety of attacks and threats: leaks of confidential, loss of data, network abuse, identity theft, illegal invasion. At present, some enterprises have established the appropriate network security systems, but in actual use, because of the wrong use of various security tools, the phenomenon of system vulnerabilities, illegal software, viruses and malicious code intrusion causes the computer operating system can not reach the required level of standard safety levels.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1384-1388

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Zahir Tari, Shun-Wu Chan, A Role-Based Access Control for Intranet Security, , IEEE Internet Computing, vol. 1, no. 5, pp.24-34, Sept. -Oct. (1997).

DOI: 10.1109/4236.623965

Google Scholar

[2] Gao Fuxiang, Li Sha, Wang Xiaolu, Yao Lan, A Security Architecture for Intranet Based on Security Area Division, iitsi, pp.539-543, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics, (2010).

DOI: 10.1109/iitsi.2010.33

Google Scholar

[3] Tong Liu, Prathima Agrawal, A Trusted Integrity Measurement Architecture for Securing Enterprise Network, trustcom, pp.726-731, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, (2011).

DOI: 10.1109/trustcom.2011.94

Google Scholar

[4] P. Bera, S.K. Ghosh, Pallab Dasgupta, Fault Analysis of Security Policy Implementations in Enterprise Networks, netcom, pp.240-245, 2009 First International Conference on Networks & Communications, (2009).

DOI: 10.1109/netcom.2009.82

Google Scholar

[5] Chao Chen, Ke Wang, Yiqi Dai, A Novel Architecture for Enterprise Network Security, cis, vol. 1, pp.537-541, 2009 International Conference on Computational Intelligence and Security, (2009).

DOI: 10.1109/cis.2009.141

Google Scholar