Xin-zheng LONG,Cheng-jie XING,Rong-bin OUYANG,Qian-yi WANG,Li LI,Yun-feng LIU. Design and application research on management information system security architecture in digital campus[J]. Journal on Communications, 2014, 35(Z1): 178-184.
郜宪林 . DGSA、SSAF和CDSA安全体系结构比较与分析[J]. 计算机工程与应用, 2002,(3): 96-98,113. GAO X L . Comparison and analysis of DGSA,SSAF and CDSA[J]. Computer Engineering and Applications, 2002,(3): 96-98,113.
[2]
胡志昂, 范红 . 信息系统等级保护安全建设技术方案设计实现与应用[M]. 北京: 电子工业出版社, 2010. HU Z A , FAN H . Implementation and application of the Technology Scheme Design of Information System Security Protection Grade Construction[M]. Beijing: Publishing House of Electronics IndustryPress, 2010.
[3]
黄志球 . 数据库应用技术基础[M]. 北京: 机械工业出版社, 2003. HUANG Z Q . Database Application Technology Basic[M]. Beijing: China Machine PressPress, 2003.
[4]
程敏, 宋金玉 . Oracle数据库透明数据加密方式研究[J]. 信息安全与通信保密, 2007,(8): 153-155. CHENG M , SONG J Y . Research on transparent data encryption of Oracle database[J]. Information Security and Communications Privacy, 2007,(8): 153-155.
[5]
卢加元, 包勇 . 远程访问服务中的身份认证技术[J]. 计算机工程与设计, 2005,26(7): 1762-1764. LU J Y , BAO Y . Identity authentication technology in remote access service[J]. Computer Engineering and Design, 2005,26(7): 1762-1764.