The Community for Technology Leaders
2014 Tenth International Conference on Computational Intelligence and Security (CIS) (2014)
Kunming, Yunnan, China
Nov. 15, 2014 to Nov. 16, 2014
ISBN: 978-1-4799-7433-7
pp: 628-632
ABSTRACT
At the present, personal sensitive information protection is faced with serious situation. In order to solve the problems in personal sensitive information protection in internet, the model of security protection in personal sensitive information is built in this paper. By analyzing the leakage way of personal sensitive information, the corresponding information security protection strategies which composed by protocol security, Web application security, database security, and real time encrypt/decrypt technology are adopted in the model. The model can reach the purpose that protects personal sensitive information in both internal and external internet, provide a safety method for enterprises and organizations in internet.
INDEX TERMS
Databases, Internet, Protocols, Information security, Encryption
CITATION

Y. Wang, C. Li and N. Cheng, "Internet Security Protection in Personal Sensitive Information," 2014 Tenth International Conference on Computational Intelligence and Security (CIS), Kunming, Yunnan, China, 2014, pp. 628-632.
doi:10.1109/CIS.2014.129
80 ms
(Ver 3.3 (11022016))