ABSTRACT
With the more and more extensive using of the office automation system, people require more on the data security. This paper firstly introduces the theory knowledge of OA system, cryptology, network communication security and so on; then, on this basis, it designs the database encryption system, analyzes the system structure diagram, and describes the specific module function; finally the data transmission is studied, and a part of the core code for the communication between the mobile phone and computer is given. This paper has a positive effect for software developers and database administrators.
- Wu Run-xiu, Sun hui, Wu shui-xiu, Data distribution algorithm for distributed office automation system.Computer Engineering and Applications, 43,(12)164--166, 2007Google Scholar
- Yuan qiong, The government OA system based on shareable technique of metadata, Control & Automation, 22(12) pp. 254--256, 2006Google Scholar
- Hou Zonghan, Anti-accident exercise of failure recovery based on OA system database, Network Security Technology & Application,(9), 93--94, 2009Google Scholar
- HuangYan, One security management system design of comprehensive network data, HINA SCIENCE AND TECHNOLOGY INFORMATION,(5), 64--65, 2008Google Scholar
- Xue Tao, Lv Yi, Security system analysis of cloud data center, Financial Computer of Huanan,(8), 50--53, 2012Google Scholar
- Lin Xiaofen Fu Minfeng, Data security during the network transmission, SOFTWARE GUIDE, 11(1), 139--141, 2012Google Scholar
Index Terms
- Research on the Key Data Security Based on OA System
Recommendations
Network Security Platform Design Based on WWW Information System
MVHI '10: Proceedings of the 2010 International Conference on Machine Vision and Human-machine InterfaceNetwork security involves the security of data transmission, the confidentiality of communications, the legitimacy of key management; it is a comprehensive application of information security technology. Shopping on the Internet in the business ...
Using DNA to develop a lightweight symmetric encryption method to encrypt the data of IoT devices
The security and integrity of the data generated from the internet of things (IoT) devices transmitted via networks must be preserved. Traditional encryption methods are used to encrypt IoT data, but they require more processing power, which IoT devices ...
Lightweight cryptography system for IoT devices using DNA
AbstractMany lightweight encryption algorithms have been developed for tackling the limitations of resources on the Internet of Things (IoT) devices. Such devices have limited processing capabilities in terms of speed, storage, and memory. In ...
Graphical abstractDisplay Omitted
Comments