Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (6): 71-75    DOI: 10.11925/infotech.1003-3513.2004.06.19
Current Issue | Archive | Adv Search |
Study on the Integrated Framework for E-Government Network Security
Yu Xiaozheng1   Gu Hao1   Chen Dingquan2  
1(School of Information, Guangdong Business College, Zhongshan University, Guangzhou 510320, China)
2(School of Information Science and Technology, Guaugzhou 510275, China)
Export: BibTeX | EndNote (RIS)      

This paper analyses some key technologies of network security for E-government, including firewall, intrusion detection, shadow scan and physical isolation technique, etc. The Defense-in-Depth & Assurance Framework of network information system is presented which is based on detection and responsive, the function and its subsystems are also described. At last, this paper illustrates an application example at the end of the paper.

Key wordsE-government      Network security      Firewall      Intrusion detection      Defense-in-depth     
Received: 18 January 2004      Published: 25 June 2004


Corresponding Authors: Yu Xiaozheng     E-mail:
About author:: Yu Xiaozheng,Gu Hao,Chen Dingquan

Cite this article:

Yu Xiaozheng,Gu Hao,Chen Dingquan. Study on the Integrated Framework for E-Government Network Security. New Technology of Library and Information Service, 2004, 20(6): 71-75.

URL:     OR

1 余青霓等译.网络入侵检测分析员手册.人民邮电出版社,2001
2 胡华平,黄遵国,庞立会等.网络安全纵深防御与保障体系.我国国防信息安全战略研讨会,2001
3 胡华平,陈海涛,黄辰林等.入侵检测系统的研究现状与发展趋势.计算机工程与科学,2001,23(2):20-25
4 IATF3.0-2000,信息保障技术框架
5 赵战生.中国信息安全体系结构基本框架域构想.计算机安全,2002,1(11):44-47
6 肖庭治,王应泉.网络安全防御体系研究.2001信息安全体系学术研讨会,2001
7 刘宝旭,徐菁,徐榕生.黑客入侵防护体系研究与设计.计算机工程与应用,2001,37(8):1-3
8 ISO/IEC15408,信息技术安全评定标准(ITSEC)
9 刘占全.网络管理与防火墙技术.人民邮电出版社,2001:43-57

[1] Zhang Yi,Yang Yi,Deng Wen. A Systematic Review of Factors Influencing Online Trust[J]. 数据分析与知识发现, 2020, 4(5): 15-26.
[2] Wang Xiaoliang, Wang Wei. Constructing Statistical Analysis System of Electronic Periodical Databases Based on the Firewall Log Mining[J]. 现代图书情报技术, 2013, 29(7/8): 122-126.
[3] Qiao Jianzhong. Research and Implementation of Classification System of E-government Information Resources Based on Business Association[J]. 现代图书情报技术, 2010, 26(9): 28-36.
[4] Li Jiao, Liu Xilin. Study on Quick Response Information Service Model of E-government[J]. 现代图书情报技术, 2010, 26(9): 42-47.
[5] Fan Bo. The Process of Transformation and Integration Method for Spatial Data in E-government Systems[J]. 现代图书情报技术, 2010, 26(4): 35-40.
[6] Shi Hongjuan,Li Chaoyang. The Application of Active Directory in University Libraries’ Network Security ——Taking Library of Renmin University of China as an Example[J]. 现代图书情报技术, 2009, 25(6): 85-88.
[7] Xia Lixin,Ye Fei. Construction of Data Integration Model of e-Government System of  City Circle Based on Topic Maps[J]. 现代图书情报技术, 2009, 25(11): 17-22.
[8] Gao Guowei,Wang Yanzhang,Wang Ning. Application Study on Metadata Management Model in the E-government Document System Realization[J]. 现代图书情报技术, 2008, 24(6): 28-33.
[9] Zhao Dongxia,Zhao Xinli. Study About Government Ontology Construction Based on the E-government Thesauri[J]. 现代图书情报技术, 2008, 24(3): 73-77.
[10] Miao Yuanzhao. Discussion on Security Monitor to the Computer Network System of the College Digitalization Library Based on Open Source Software[J]. 现代图书情报技术, 2007, 2(6): 91-95.
[11] Chen Hongjie,Liu Xilin . Research on the Information Management in the E-Governmeut Message Feedback System[J]. 现代图书情报技术, 2007, 2(2): 78-81.
[12] Ma Jing,Li Qv . The Essential Elements of System Behavior and Design of Its Inspect Mechanism[J]. 现代图书情报技术, 2007, 2(1): 77-80.
[13] Wang Hao . System Modeling of E-Government Based on Unified Modeling Language[J]. 现代图书情报技术, 2006, 1(7): 66-72.
[14] Zhang Dexiang,Mu Jianbo,Wang Xiaoyan,Jia Xiaozhu . Design and Implementation of Network Security System for the Library Based on Virtual Technique[J]. 现代图书情报技术, 2006, 1(6): 73-76.
[15] He Zhen. Establishing and Optimizing the Common Development and Share  Model of E-government Information Resources[J]. 现代图书情报技术, 2005, 21(6): 70-75.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938