The Study of Access Control and Domestic Specification of Information Security Management
碩士 === 國立中央大學 === 資訊管理學系碩士在職專班 === 96 === With the onset of the online revolution, the pace of business has completely changed. So does the thinking of information security. The more e-commerce service running on the internet, the more people pay much attention to security of information and informa...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/48054601731237164832 |
id |
ndltd-TW-096NCU05396065 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NCU053960652015-11-25T04:04:55Z http://ndltd.ncl.edu.tw/handle/48054601731237164832 The Study of Access Control and Domestic Specification of Information Security Management 存取控制機制與國內資安規範之研究 Hsiao-feng Chiang 江曉峯 碩士 國立中央大學 資訊管理學系碩士在職專班 96 With the onset of the online revolution, the pace of business has completely changed. So does the thinking of information security. The more e-commerce service running on the internet, the more people pay much attention to security of information and information system. The paper represents the access control and how it plays the important role in Information Security Architecture. Access control is concerned with determining the allowed activities of legitimate users, mediating every access attempted by user in the system, more sophisticated and complex control is granted after successful identification, authentication and authorization of the user. Through the explanation for popularity of access control solutions, specification of information security management, and case study, the paper comes up with the best practice for the access control system implementation, and makes suggestions to the organizations planning to implement an access control scheme. Shi-Jen Lin 林熙禎 2008 學位論文 ; thesis 77 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊管理學系碩士在職專班 === 96 === With the onset of the online revolution, the pace of business has completely changed. So does the thinking of information security. The more e-commerce service running on the internet, the more people pay much attention to security of information and information system.
The paper represents the access control and how it plays the important role in Information Security Architecture. Access control is concerned with determining the allowed activities of legitimate users, mediating every access attempted by user in the system, more sophisticated and complex control is granted after successful identification, authentication and authorization of the user.
Through the explanation for popularity of access control solutions, specification of information security management, and case study, the paper comes up with the best practice for the access control system implementation, and makes suggestions to the organizations planning to implement an access control scheme.
|
author2 |
Shi-Jen Lin |
author_facet |
Shi-Jen Lin Hsiao-feng Chiang 江曉峯 |
author |
Hsiao-feng Chiang 江曉峯 |
spellingShingle |
Hsiao-feng Chiang 江曉峯 The Study of Access Control and Domestic Specification of Information Security Management |
author_sort |
Hsiao-feng Chiang |
title |
The Study of Access Control and Domestic Specification of Information Security Management |
title_short |
The Study of Access Control and Domestic Specification of Information Security Management |
title_full |
The Study of Access Control and Domestic Specification of Information Security Management |
title_fullStr |
The Study of Access Control and Domestic Specification of Information Security Management |
title_full_unstemmed |
The Study of Access Control and Domestic Specification of Information Security Management |
title_sort |
study of access control and domestic specification of information security management |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/48054601731237164832 |
work_keys_str_mv |
AT hsiaofengchiang thestudyofaccesscontrolanddomesticspecificationofinformationsecuritymanagement AT jiāngxiǎofēng thestudyofaccesscontrolanddomesticspecificationofinformationsecuritymanagement AT hsiaofengchiang cúnqǔkòngzhìjīzhìyǔguónèizīānguīfànzhīyánjiū AT jiāngxiǎofēng cúnqǔkòngzhìjīzhìyǔguónèizīānguīfànzhīyánjiū AT hsiaofengchiang studyofaccesscontrolanddomesticspecificationofinformationsecuritymanagement AT jiāngxiǎofēng studyofaccesscontrolanddomesticspecificationofinformationsecuritymanagement |
_version_ |
1718135920230662144 |