Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com...
详细信息
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable command on disaster recovery. It uses selfsupervision function to monitor the integrality and security of system itself. Through GIS, this model makes disaster recovery system easier to use, manage and maintain. RDRSM possesses features of security, robustness and controllability and can be applied to environments such as e-government and bank. This model successfully conducted the construction of an important e-government disaster recovery system, which verified its feasibility and the significance of its components, such as disaster recovery planning, system supervision and robust communication support.
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ...
详细信息
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or reconstruction of CIS. Using layered method, it divides CIS into modules and reduces system complexity. Web service technology is widely adopted in layers to fulfill interoperability and extensibility. It uses encryption support layer, securityprotection and reliability support layer to guarantee system security and stability in different aspects. It uses system management layer to make CIS administrable. It suits highly security-critical environment such as government and bank. Been properly simplified, it can be applied to relative simple information system too.
暂无评论