skip to main content
10.1145/3332324.3332339acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemcConference Proceedingsconference-collections
research-article

Research on the Key Data Security Based on OA System

Authors Info & Claims
Published:22 May 2019Publication History

ABSTRACT

With the more and more extensive using of the office automation system, people require more on the data security. This paper firstly introduces the theory knowledge of OA system, cryptology, network communication security and so on; then, on this basis, it designs the database encryption system, analyzes the system structure diagram, and describes the specific module function; finally the data transmission is studied, and a part of the core code for the communication between the mobile phone and computer is given. This paper has a positive effect for software developers and database administrators.

References

  1. Wu Run-xiu, Sun hui, Wu shui-xiu, Data distribution algorithm for distributed office automation system.Computer Engineering and Applications, 43,(12)164--166, 2007Google ScholarGoogle Scholar
  2. Yuan qiong, The government OA system based on shareable technique of metadata, Control & Automation, 22(12) pp. 254--256, 2006Google ScholarGoogle Scholar
  3. Hou Zonghan, Anti-accident exercise of failure recovery based on OA system database, Network Security Technology & Application,(9), 93--94, 2009Google ScholarGoogle Scholar
  4. HuangYan, One security management system design of comprehensive network data, HINA SCIENCE AND TECHNOLOGY INFORMATION,(5), 64--65, 2008Google ScholarGoogle Scholar
  5. Xue Tao, Lv Yi, Security system analysis of cloud data center, Financial Computer of Huanan,(8), 50--53, 2012Google ScholarGoogle Scholar
  6. Lin Xiaofen Fu Minfeng, Data security during the network transmission, SOFTWARE GUIDE, 11(1), 139--141, 2012Google ScholarGoogle Scholar

Index Terms

  1. Research on the Key Data Security Based on OA System

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Other conferences
                  ICEMC '19: Proceedings of the 2019 International Conference on E-business and Mobile Commerce
                  May 2019
                  90 pages
                  ISBN:9781450371827
                  DOI:10.1145/3332324

                  Copyright © 2019 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 22 May 2019

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article
                  • Research
                  • Refereed limited
                • Article Metrics

                  • Downloads (Last 12 months)8
                  • Downloads (Last 6 weeks)0

                  Other Metrics

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader