2010 Third International Symposium on Electronic Commerce and Security 2010
DOI: 10.1109/isecs.2010.96
|View full text |Cite
|
Sign up to set email alerts
|

The Study and Design on Data Security System of E-government Intranet

Abstract: To deal with the data security problems in the storage system for the E-government intranet, an integrated data security defense system, which incorporates information isolation, access control, virus detection, content filtering, real time backup and rapid information retrieval, has been designed and implemented. The result on trial displays that this system can ensure the data security of storage system for E-government intranet, with few side effects on the I/O performance of the network.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
0
0
Order By: Relevance
“…Some statistics indicates that 63.6% of enterprises in China are on the security class of "high risk", and they suffer economic loss of up to billions dollars for network data leakage. More surprisingly, in all security accidents, the accident ratio of network border to inner network is 3 to 7, and more than 70% accidents of file data damage and leakage are caused by the intranet data security, and has move the threat from external network to internal network [1] [2].…”
Section: Introductionmentioning
confidence: 99%
“…Some statistics indicates that 63.6% of enterprises in China are on the security class of "high risk", and they suffer economic loss of up to billions dollars for network data leakage. More surprisingly, in all security accidents, the accident ratio of network border to inner network is 3 to 7, and more than 70% accidents of file data damage and leakage are caused by the intranet data security, and has move the threat from external network to internal network [1] [2].…”
Section: Introductionmentioning
confidence: 99%