정보보호 기반을 이용한 경호관리 프로토콜 설계 및 구현
Design and embodiment of security protocol for the Guard management of information protection
iii, 67 p.
정보보호 미들웨어 경호관리프로토콜;
- 원문 URL
This paper embodied the security concept as message transmission protocol whose function includes electronic sign and distribution of public key along with certification in order to maintain the security concept continuously on TCP/IP It classifies security technology, security policy, transmission of electronic document, secret code/multiple code key, depending on the functions to compare the embodied contents and requirements from the produced values at the embodied protocol, taking security protocol into considerations by functions. It also presents SCM model for the maintenance of succession of information protection based on the design and embodied specifications, while investigating client/server and middleware environments for the establishment of the system related to information protection and comparing the functions. It analyzes the requirements on the development system for information protection, thereby selecting the structure of middleware based on the results. Introducing the commercial middleware for the system development involves necessary functions along with high costs. Therefore it studied the system structure for the middleware manufacturing with high performance and low costs, analyzing the functions for the middleware system establishment and designing in detail for application establishment. Many enterprizers recognizes the importance of information protection in enterprise. However, the establishment of information protection system costs lots )f costs. If all the enterprises can establish the system with low costs, huge losses of the state and the enterprise by information leak can be reduced.