Dissertation > Excellent graduate degree dissertation topics show

Bank counter service system security solutions

Author: MouLei
Tutor: LiuYi;ZhangWenSheng
School: University of Electronic Science and Technology
Course: Software Engineering
Keywords: Bank Security Counter service Secure Server Security control design
CLC: TP393.08
Type: Master's thesis
Year: 2011
Downloads: 35
Quote: 0
Read: Download Dissertation


Security has become one of the most important issue in domestic and foreign financial computer application system to be considered . The counter business system for the rapid development of various specialized banks , the paper analyzes the specific needs of the relevant banking security , the threat of bank computer application system . According to a specific , universal and good security architecture model , according to the modular design concept , completed the design of a more comprehensive security control , ie the detailed design of a secure server . This implementation is highly targeted security mechanism , the security services required to provide specific business security server system , as an important part of the security solution , provide better security for banking server . Papers for the banking business , in particular the security threat of counter service for more detailed analysis , relying on the overall security server system designed solutions , based on the security mechanisms and security services for counter service a more complete analysis ; papers on the security server security mechanisms library programming completed preprocessing module , security mechanisms library , as well as security control system and other functions , the server requires security mechanisms and security services to achieve a more comprehensive security controls . The effect of server design and put into use , the design and operation of a secure server achieved the expected goals , the corresponding server design concepts and methods for the development of a new generation of counter service system has certain reference value .

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  3. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  4. Multiple Pairwise Keys Management Protocol of Function Node-Based for Wireless Sensor Networks,TP212.9
  5. Military exercises in the Corps of Engineers engineering equipment maintenance to protect the allocation of resources,E251.2
  6. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  7. Study on US Veterans’ Social Security System and Its Enlightenment to China,E712
  8. Yellow phosphorus storage tank area of Safety Evaluation,TQ126.317
  9. Study on Evaluation Index System for Land Ecological Security,X826
  10. Urban Community Security Service Research in Terms of New Public Service Theory,D631.4
  11. Research on the Social Security of Fishermen under the Harmonious Society,D632.1
  12. Genetically Modified Food Ethics,B82-05
  13. On the systematic construction of the Chinese Communist Party democracy,D262.11
  14. The Analysis about Modes of Exchanging Land Contracted Management Right for Urban Social Security,D632.1
  15. Research on a Fire-fighting Shell for Towers,TU892
  16. Evaluation of Land Use Eco-security in Fujian Province,X826
  17. The Study on Landless Peasants Protection of Interests in Urbanization Process in Southeast China,D422.6
  18. Study on the Social Security of Migrant Workers in Suzhou City,D412.6
  19. Shanghai Public Security Authorities of the Police Job Classification,D631.1
  20. The Study on the Management of the Labor Security Inspection,F249.27
  21. Study of Evaluation System on Security Management of HS Company,F426.21

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile