Safe and Efficient System Design of University Financial Information System

Article Preview

Abstract:

The establishment of security and overall system protection system in financial of university information system is currently facing important issues. This paper uses the financial of university information system of Beijing as background. The aim is to protect against overall system levels within the net for targets. The security and overall system protection system can enhance the security of a level and ensure financial of university information system in a secure and stable network environment and effective operation.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 962-965)

Pages:

3059-3062

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] R Li, Y Yang. Network security assessment based on fuzzy sets and rough sets. The 5th International Conference on Wireless Communications, Networking and Mobile Computing, 1-4(2009).

DOI: 10.1109/wicom.2009.5302948

Google Scholar

[2] L.J. Wang, B Wang, Y.J. Peng. Research the information security risk assessment technique based on Bayesian network. The 3rd International Conference on Advanced Computer Theory and Engineering, 3: 600-604(2010).

DOI: 10.1109/icacte.2010.5579740

Google Scholar

[3] S Foresti, J Agutter, Y Livnat. Visual correlation of network alerts. Computer Graphics and Applications, 26(2): 48-59(2006).

DOI: 10.1109/mcg.2006.49

Google Scholar

[4] Y Wei. Network security situation assessment model research. Anhui: University of Science and Technology of China, 8-9(2009).

Google Scholar

[5] Lists.In:Proceedings of the 46m IEEE International Midwest Symposium on Circuits and Systems, Dec, 512-515(2003).

Google Scholar

[6] F Martin, B Kent, B John. Improving the Design of Existing Code. AddisonWesley Longman, (3): 21-23(2002).

Google Scholar

[7] C Kenneth. Organization and Technology in the Networked Enterprise, Management Information System, 5-8(2002).

Google Scholar

[8] L Ratsimar, F Tim. A work for intelligent marketing immobile peer-to-peer environments, NewYork:Acmpress, 16-17(2003).

Google Scholar

[9] W Lin,J Shen. Security enhancement for 0ptical Strong-Password Authentication protocol. ACM SIGOPS Operating Systems Review, 37(2): 7-12(2003).

DOI: 10.1145/881783.881785

Google Scholar