Font Size: a A A

Research Of Unitive Security Pattern & RBAC Technology In Recombinating Manufacture Resource

Posted on:2006-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:X D CongFull Text:PDF
GTID:2168360155975411Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Dynamic Alliance, Resource Sharing and Information Security are key problems in modern recombinating manufacture resource. The emergence of dynamic alliance of manufacture enterprise, drivers great changes of traditional producing ways in manufacture enterprise, realizes supplement, cooperation and resource sharing between allied enterprises, optimizes environment of recombinating manufacture resource. In this paper, to ensure the security about sharing environment of allied resource for allied enterprises as purpose, we put RBAC ideas of access control in depth research, and expand the common RBAC model for some aspects. The new model solves the lack of context for Roles, and the Rule-driven RBAC ensure implement for "Least Privilege Rule"of system security, reduce the security hidden trouble which brought from randomness operation. About the distributed peculiarities of allied resource, this paper discuss some problems of unitive authentication system deeply, the existing authentication theories and technologies are analyzed. It is established that the unitive authentication technology is a general concept of many supporting technologies, an many correlative technologies compositing. We integrated the RBAC access control technology and unitive authentication technique organically, so we can constitute the Unitive Security Pattern for sharing environment of allied resource. From the view of security, the correlative problems of network security are analyzed and summarized deeply. The encryption service related with this paper are summarized, and the model of modified hash algorithm are set up for requirement of information encryption. At the same time we exercise the operation system API for sensitive data encryption and system log management. At last, the prototype system is set up in coordination with theory RBAC, the network model unitive authentication. The exactness and feasibility of the prototype system has been verified.
Keywords/Search Tags:Dynamic-Alliance, Network-Security, Access-Control, RBAC, Unitive-Authentication
PDF Full Text Request
Related items