본문 바로가기
HOME> 논문 > 논문 검색상세

학위논문 상세정보

정보보호 기반을 이용한 경호관리 프로토콜 설계 및 구현 원문보기
Design and embodiment of security protocol for the Guard management of information protection

  • 저자

    문건필

  • 학위수여기관

    중부대학교

  • 학위구분

    국내석사

  • 학과

    전자계산학과

  • 지도교수

  • 발행년도

    2001

  • 총페이지

    iii, 67 p.

  • 키워드

    정보보호 미들웨어 경호관리프로토콜;

  • 언어

    kor

  • 원문 URL

    http://www.riss.kr/link?id=T8948973&outLink=K  

  • 초록

    This paper embodied the security concept as message transmission protocol whose function includes electronic sign and distribution of public key along with certification in order to maintain the security concept continuously on TCP/IP It classifies security technology, security policy, transmission of electronic document, secret code/multiple code key, depending on the functions to compare the embodied contents and requirements from the produced values at the embodied protocol, taking security protocol into considerations by functions. It also presents SCM model for the maintenance of succession of information protection based on the design and embodied specifications, while investigating client/server and middleware environments for the establishment of the system related to information protection and comparing the functions. It analyzes the requirements on the development system for information protection, thereby selecting the structure of middleware based on the results. Introducing the commercial middleware for the system development involves necessary functions along with high costs. Therefore it studied the system structure for the middleware manufacturing with high performance and low costs, analyzing the functions for the middleware system establishment and designing in detail for application establishment. Many enterprizers recognizes the importance of information protection in enterprise. However, the establishment of information protection system costs lots )f costs. If all the enterprises can establish the system with low costs, huge losses of the state and the enterprise by information leak can be reduced.


 활용도 분석

  • 상세보기

    amChart 영역
  • 원문보기

    amChart 영역