Security Policy on Logistics Management Information System Based on Web

Article Preview

Abstract:

With the internet development and further development of information technique applications, information management system is used more and more widely in logistics enterprises, but consequent security issues of network information have become increasingly prominent. The paper was set in information system of logistics management of some company; security problem of application system in logistics enterprise under network environment was studied, and security architecture of logistics management information system and specific design program were introduced.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

1225-1229

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Gu Yongtao, Ge Lihong, and Ju Shuchun, Analysis to Safety of Electric Power System Information Network, Inner Mongolia Electric Power, vol. 28 (S2), p.18, (2010).

Google Scholar

[2] Wu Huili, and Fang Jiajuan, The Research of Datebase Security Technology Based on Web, Information security and technology, p.8–10, August (2011).

Google Scholar

[3] Han Jingfeng, Study on Security Policy of Computer Network Database, Information security and technology, p.3–4, August (2011).

Google Scholar

[4] Zhi Hecai, Yu Yanming, Study of Web-based Database System to Prevent Intrusion of Technology and Countermeasures, Coal Technology, p.239–240, September (2011).

Google Scholar

[5] Lin Ming, Ye Qing, and Qin Wei, Analysis of Datebase Security Technology Based on Web, Information & Communications, p.90–91, April (2011).

Google Scholar

[6] Hou Youli, Three-tier Structure Design of Database Security, Communications Technology, vol 44, p.118–120, April (2011).

Google Scholar

[7] Luo Changzhuang, New Thinking on Data Encryption Methods, Computer Era, p.17–18, September (2010).

Google Scholar

[8] Ma Hao, Wang Xiaoming, Security Access Control Mechanism of Outsourced Database, Computer Engineering, vol. 37, p.173–175, May (2011).

Google Scholar

[9] Chen Guang, and Zhang Xikun, Research and design of algorithm based on data encryption, Information Technology, p.148–152, May (2010).

Google Scholar