Optimization of Student Evaluation Information System Based on ASP.NET

Article Preview

Abstract:

The development of information technology change rapidly, which breaks the traditional method of browsing information. Open distribution interface has brought certain risks to the information security. Solving security problems of information system is the hot topic in this field. In this paper we first analyze mainstream B/S system architecture of the current information system, and analyze the principle of ASP.NET visiting Web database. On this basis we do multilevel encryption processing on students’ evaluation information system, so as to realize the optimization of information security. In order to verify the security performance, we use software to do simulation testing. The results show that the method has strong practicability, good encryption effect. It solves encryption of students’ evaluation information system to a certain extent.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

286-290

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Zhou Qiang, Yang Geng. Data fusion algorithm of protecting data integrity and privacy in WSNs [J]. Computer Application Research, 2013(2): 2-10.

Google Scholar

[2] Zhang Lei, Zhou Jifeng, Zhang Qiang. Research on system software reliability demonstration test [J]. Computer and digital engineering, 2010(6): 23-29.

Google Scholar

[3] Li Yan. Study on information security technology based on digital certificate [J]. The application of information technology, 2012(7): 45-51.

Google Scholar

[4] Maocai Wang. An efficient generation method of elliptic curve for pairing-based cryptosystems. Proc. of 2010 International Conference on Machine Vision and Human-machine Interface, MVHI2010, Kaifeng, China.

DOI: 10.1109/mvhi.2010.211

Google Scholar

[5] Bob Gourley. Cloud Computing and Net Centric Operations [J]. Department of Defense Information Management and Information Technology Strategic Plan, 2011(18): 1023-1030.

Google Scholar

[6] Hu Guangjun. Research on the strategies of acquiring information based on dynamic game [J]. Technology review, 2012(4): 34-41.

Google Scholar

[7] Gaffney, J. E, Jr. Ulvila, J.W. Evaluation of intrusion detectors: a decision theory approach [J]. Security and Privacy, 2011. S&P 2011, 2011(6): 50-61.

DOI: 10.1109/secpri.2001.924287

Google Scholar

[8] He Dequan, Tang Zhengjun, Li Jianhua. The intrusion detection technology [M]. Tsinghua University press, 2012: 50-62.

Google Scholar

[9] Kun Wang, Lihua Zhou, Zhen Cai, Zengxin Li, A Disaster Recovery System Model in an e-Government System [J]. Sixth International Conference on Parallel and Distributed Computing Applications and Technologies, 2010(7): 247-250.

DOI: 10.1109/pdcat.2005.6

Google Scholar

[10] Wang Xiao, Xue Zhi. Wang Yijun. Game analysis of intrusion detection system based on honeypot [J]. Information and communication security, 2011(12): 55-61.

Google Scholar

[11] K Yu, Hu Liang, Zhang Xiaohui. A distributed intrusion detection system model based on agent and honeypot [J]. Journal of Jilin University (SCIENCE EDITION), 2011(3): 34-41.

Google Scholar

[12] Joan C. Steyaert. Measuring the performance of electronic government services [J]. Information & Management, 2011(41): 369-375.

Google Scholar