The Study of Access Control and Domestic Specification of Information Security Management

碩士 === 國立中央大學 === 資訊管理學系碩士在職專班 === 96 === With the onset of the online revolution, the pace of business has completely changed. So does the thinking of information security. The more e-commerce service running on the internet, the more people pay much attention to security of information and informa...

Full description

Bibliographic Details
Main Authors: Hsiao-feng Chiang, 江曉峯
Other Authors: Shi-Jen Lin
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/48054601731237164832
id ndltd-TW-096NCU05396065
record_format oai_dc
spelling ndltd-TW-096NCU053960652015-11-25T04:04:55Z http://ndltd.ncl.edu.tw/handle/48054601731237164832 The Study of Access Control and Domestic Specification of Information Security Management 存取控制機制與國內資安規範之研究 Hsiao-feng Chiang 江曉峯 碩士 國立中央大學 資訊管理學系碩士在職專班 96 With the onset of the online revolution, the pace of business has completely changed. So does the thinking of information security. The more e-commerce service running on the internet, the more people pay much attention to security of information and information system. The paper represents the access control and how it plays the important role in Information Security Architecture. Access control is concerned with determining the allowed activities of legitimate users, mediating every access attempted by user in the system, more sophisticated and complex control is granted after successful identification, authentication and authorization of the user. Through the explanation for popularity of access control solutions, specification of information security management, and case study, the paper comes up with the best practice for the access control system implementation, and makes suggestions to the organizations planning to implement an access control scheme. Shi-Jen Lin 林熙禎 2008 學位論文 ; thesis 77 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 資訊管理學系碩士在職專班 === 96 === With the onset of the online revolution, the pace of business has completely changed. So does the thinking of information security. The more e-commerce service running on the internet, the more people pay much attention to security of information and information system. The paper represents the access control and how it plays the important role in Information Security Architecture. Access control is concerned with determining the allowed activities of legitimate users, mediating every access attempted by user in the system, more sophisticated and complex control is granted after successful identification, authentication and authorization of the user. Through the explanation for popularity of access control solutions, specification of information security management, and case study, the paper comes up with the best practice for the access control system implementation, and makes suggestions to the organizations planning to implement an access control scheme.
author2 Shi-Jen Lin
author_facet Shi-Jen Lin
Hsiao-feng Chiang
江曉峯
author Hsiao-feng Chiang
江曉峯
spellingShingle Hsiao-feng Chiang
江曉峯
The Study of Access Control and Domestic Specification of Information Security Management
author_sort Hsiao-feng Chiang
title The Study of Access Control and Domestic Specification of Information Security Management
title_short The Study of Access Control and Domestic Specification of Information Security Management
title_full The Study of Access Control and Domestic Specification of Information Security Management
title_fullStr The Study of Access Control and Domestic Specification of Information Security Management
title_full_unstemmed The Study of Access Control and Domestic Specification of Information Security Management
title_sort study of access control and domestic specification of information security management
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/48054601731237164832
work_keys_str_mv AT hsiaofengchiang thestudyofaccesscontrolanddomesticspecificationofinformationsecuritymanagement
AT jiāngxiǎofēng thestudyofaccesscontrolanddomesticspecificationofinformationsecuritymanagement
AT hsiaofengchiang cúnqǔkòngzhìjīzhìyǔguónèizīānguīfànzhīyánjiū
AT jiāngxiǎofēng cúnqǔkòngzhìjīzhìyǔguónèizīānguīfànzhīyánjiū
AT hsiaofengchiang studyofaccesscontrolanddomesticspecificationofinformationsecuritymanagement
AT jiāngxiǎofēng studyofaccesscontrolanddomesticspecificationofinformationsecuritymanagement
_version_ 1718135920230662144