Abstract： With the development and application of information technology, information security has been paid more and more attention by the state, enterprises and the public. Information security technology is clearly regarded as one of the key technologies for priority development in the Eleventh Five-Year Plan for the Development of Information Industry Science and Technology and the outline of the medium-and long-term Plan for 2020. It mainly includes emergency response, cryptography technology, electronic authentication, information security evaluation technology and so on. As the daily affairs of enterprises rely more and more on ERP system, the security of ERP system has been paid more and more attention. The security management information platform developed by Sichuan Chengdu Tobacco Company is managed by workflow technology based on the private cloud of the enterprise. In the security design of the information platform, the data storage security in the private cloud, the code ultra vires prevention measures of workflow technology, the true identity authentication of ERP system security and the audit of key operations are considered, thus ensuring the confidentiality and security of information in ERP systems.
Keyword： information security; private cloud; workflow technology; ERP system;
阮进勇, 徐凌宇, 丁广太.数字海洋云计算平台工作流安全机制[J].计算机技术与发展, 2015, 25 (01) :155-158+182.
叶鑫, 梁继伟, 尹艳丽.考虑信息安全因素的多目标云工作流调[J].计算机集成制造系统, 2017, 23 (05) :972-982.
范月祺.云储存系统结构模型及安全策略[J].电脑与电信, 2017 (04) :34-35+43.
江涛.云存储安全技术分析与对策[J].电脑知识与技术, 2017, 13 (03) :28-29.
王梅.云储存系统结构模型及安全策略[J].信息系统工程, 2018 (09) :75.
郭玉芝, 唐国城.关于私有云的系统安全性研究[J].电脑知识与技术, 2018, 14 (30) :24-25.
王亚文, 郭云飞, 刘文彦, 等.面向云工作流安全的任务调度方法[J].计算机研究与发展, 2018, 55 (06) :1180-1189.
De, S.J., Pal, A.K.. A Policy-Based Security Framework for Storage and Computation on Enterprise Data in the Cloud[P].System Sciences (HICSS) , 2014 47th Hawaii International Conference on, 2014.
Anthony Lewis, Brychan Thomas, Sophie James. A critical analysis of the implementation of social networking as an e-recruitment tool within a security enterprise[J]. Cogent Business&Management, 2015, 2 (1) .