2014 Tenth International Conference on Computational Intelligence and Security (CIS) (2014)
Kunming, Yunnan, China
Nov. 15, 2014 to Nov. 16, 2014
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/CIS.2014.129
At the present, personal sensitive information protection is faced with serious situation. In order to solve the problems in personal sensitive information protection in internet, the model of security protection in personal sensitive information is built in this paper. By analyzing the leakage way of personal sensitive information, the corresponding information security protection strategies which composed by protocol security, Web application security, database security, and real time encrypt/decrypt technology are adopted in the model. The model can reach the purpose that protects personal sensitive information in both internal and external internet, provide a safety method for enterprises and organizations in internet.
Databases, Internet, Protocols, Information security, Encryption
Y. Wang, C. Li and N. Cheng, "Internet Security Protection in Personal Sensitive Information," 2014 Tenth International Conference on Computational Intelligence and Security (CIS), Kunming, Yunnan, China, 2014, pp. 628-632.