Proceedings of the 4th International Conference on Information Technology and Management Innovation

The Design of OA System Border Security Architecture Based on Security Isolation and Information Exchange Technology

Authors
Jun Ji, Fei-Fei Xing, Yu-Qing Zang
Corresponding Author
Jun Ji
Available Online October 2015.
DOI
10.2991/icitmi-15.2015.99How to use a DOI?
Keywords
Security isolation; Information security; Protection system
Abstract

According to the characteristics of OA system, the paper designs the protective system of network application boundary security isolation based on OA. The advanced security isolation exchange technology is applied to the OA system to protect the internal network security, and form full protection system architecture.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 4th International Conference on Information Technology and Management Innovation
Series
Advances in Computer Science Research
Publication Date
October 2015
ISBN
10.2991/icitmi-15.2015.99
ISSN
2352-538X
DOI
10.2991/icitmi-15.2015.99How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jun Ji
AU  - Fei-Fei Xing
AU  - Yu-Qing Zang
PY  - 2015/10
DA  - 2015/10
TI  - The Design of OA System Border Security Architecture Based on Security Isolation and Information Exchange Technology
BT  - Proceedings of the 4th International Conference on Information Technology and Management Innovation
PB  - Atlantis Press
SP  - 607
EP  - 610
SN  - 2352-538X
UR  - https://doi.org/10.2991/icitmi-15.2015.99
DO  - 10.2991/icitmi-15.2015.99
ID  - Ji2015/10
ER  -