跳至主導覽 跳至搜尋 跳過主要內容

Information System Deployment Security Architecture Based on Reverse Proxy Technology in Commercial Cryptography with Chinese Standards

研究成果: Conference contribution同行評審

摘要

In recent years, cybersecurity incidents have continued to occur. As information systems are deployed in increasing numbers, security management has become increasingly challenging. The deployment of these systems often lacks unified cybersecurity planning, failing to effectively establish security boundaries, identity authentication, and unified management. Particularly with the promotion of commercial cryptography applications in China, existing system deployment architectures face significant compatibility challenges during transformation. This paper conducts an in-depth study on the role of reverse proxy technology in system business deployment. Combining the concepts of Defense-in-Depth and Zero Trust Architecture, it proposes a scalable, standardized security architecture for system deployment. This architecture has been successfully implemented and applied within the author's organization, demonstrating promising results.

原文English
主出版物標題Proceedings of 2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025
發行者Institute of Electrical and Electronics Engineers Inc.
頁面31-36
頁數6
ISBN(電子)9798331555801
DOIs
出版狀態Published - 2025
事件2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025 - Zhuhai, China
持續時間: 11 7月 202513 7月 2025

出版系列

名字Proceedings of 2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025

Conference

Conference2025 International Conference on IOT, Data Science and Advanced Computing, IDSAC 2025
國家/地區China
城市Zhuhai
期間11/07/2513/07/25

指紋

深入研究「Information System Deployment Security Architecture Based on Reverse Proxy Technology in Commercial Cryptography with Chinese Standards」主題。共同形成了獨特的指紋。

引用此