Study and Design of Enterprise Public Security Platform based on PKI

被引:1
|
作者
Xiao Yingbin [1 ]
Zhao Yuanyuan [1 ]
机构
[1] China Tobacco Jiangsu Ind Co Ltd, Nanjing 210011, Jiangsu, Peoples R China
关键词
PKI; WPKI; LDAP; user management; authority management; application security;
D O I
10.1109/DCABES.2014.56
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In order to solve the application security problems in the business operation system in a intensive, uniform and regular manner, a public fundamental platform model based on PKI technology is proposed, and some advanced design concepts like SCA, BPEL, etc. are introduced for enhancing the reconstructing and reusing of the system. According to the characteristics of PKI system structure, it is expanded as the foundation and realizes the support for WPKI technology. The technical realization of unified user management, unified authority management and unified application security management, as well as the approaches of integrating the peripheral business system are given by analyzing the requirements of general security management of the informatization system. Furthermore, we also proposed methods to further maintain the security and stability of platform operation with technologies like queues, connection pool, etc. Those methods provide a much more uniform solution to the application security problems. The feasibility and effectiveness of the platform in improving the application security problems have been discussed by the illustrations and analysis of the core transaction processing flows of this platform.
引用
收藏
页码:258 / 262
页数:5
相关论文
共 50 条
  • [21] Network Security Design for Manufacturing Enterprise
    He, Jiangmin
    Yao, Rihuang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS, ROBOTICS AND AUTOMATION (ICMRA 2015), 2015, 15 : 1015 - 1020
  • [22] The Design of Enterprise Logistics System Based on Third-party Platform
    Wan, Haixia
    INTERNATIONAL SYMPOSIUM ON ENGINEERING TECHNOLOGY, EDUCATION AND MANAGEMENT (ISETEM 2014), 2014, : 486 - 491
  • [23] Design of a system to support security communication between a Web Proxy and a CGI program based on PKI
    Lee, J
    Yoon, K
    1998 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 461 - 468
  • [24] The Design of Enterprise Network Information Sharing Scheme Based on Security Technology
    Ji, Jun
    Xing, Fei-Fei
    Zang, Yu-Qing
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 623 - 626
  • [25] Security Considerations Based on PKI/CA in Manufacturing Grid
    YIN Yong~ 1
    2. Department of Electronics and Information Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1414 - 1418
  • [26] A Mobile Platform Solution for Public Security Application Based on Internet of Thing
    Tang Qianjin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 532 - 535
  • [27] Research and design of system security strategy based on net platform
    Zhou, Jing
    Guan, Yu-Rong
    Information Technology Journal, 2013, 12 (19) : 5097 - 5101
  • [28] Study on substation control interlocking combined with PKI/PMI based access security method
    Duan, Bin
    Liu, Nian
    Huang, Shenglong
    2006 INTERNATIONAL CONFERENCE ON POWER SYSTEMS TECHNOLOGY: POWERCON, VOLS 1- 6, 2006, : 1140 - +
  • [29] The security policy of e-business based on PKI
    Zhang, CY
    Zhang, LQ
    THIRD INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE ENGINEERING: DIGITAL ENTERPRISES AND NONTRADITIONAL INDUSTRIALIZATION, 2003, : 655 - 659
  • [30] A network security processor design based on an integrated SOC design and test platform
    Wang, Chen-Hsing
    Lo, Chih-Yen
    Lee, Min-Sheng
    Yeh, Jen-Chieh
    Huang, Chih-Tsun
    Wu, Cheng-Wen
    Huang, Shi-Yu
    43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, : 490 - 495