Information System Deployment Security Architecture Based on Reverse Proxy Technology in Commercial Cryptography with Chinese Standards

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In recent years, cybersecurity incidents have continued to occur. As information systems are deployed in increasing numbers, security management has become increasingly challenging. The deployment of these systems often lacks unified cybersecurity planning, failing to effectively establish security boundaries, identity authentication, and unified management. Particularly with the promotion of commercial cryptography applications in China, existing system deployment architectures face significant compatibility challenges during transformation. This paper conducts an in-depth study on the role of reverse proxy technology in system business deployment. Combining the concepts of Defense-in-Depth and Zero Trust Architecture, it proposes a scalable, standardized security architecture for system deployment. This architecture has been successfully implemented and applied within the author's organization, demonstrating promising results.

Original languageEnglish
Title of host publicationProceedings of 2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages31-36
Number of pages6
ISBN (Electronic)9798331555801
DOIs
Publication statusPublished - 2025
Event2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025 - Zhuhai, China
Duration: 11 Jul 202513 Jul 2025

Publication series

NameProceedings of 2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025

Conference

Conference2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025
Country/TerritoryChina
CityZhuhai
Period11/07/2513/07/25

Keywords

  • Commercial Cryptography with Chinese Standards
  • component
  • Cybersecurity Architecture
  • Reverse Proxy

Fingerprint

Dive into the research topics of 'Information System Deployment Security Architecture Based on Reverse Proxy Technology in Commercial Cryptography with Chinese Standards'. Together they form a unique fingerprint.

Cite this