Font Size: a A A

Research And Application In CSCD Of Access Control Technology Of P2P

Posted on:2006-12-10Degree:MasterType:Thesis
Country:ChinaCandidate:Z G ZhangFull Text:PDF
GTID:2178360212982558Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
People are attaching more importance to Computer Support Cooperative Design (CSCD) with the rapid development and combination of computer and network. Peer-to-Peer (P2P) technology can decrease the cost of deploying CSCD, and it can establish effective collaboration among enterprises and companies easily. How to provide access control function for CSCD based on P2P network to make the cooperative design more security, it has become a key question studied at present.The paper researches the PKI, PMI and access control technology. After describing the basic concepts, key technologies of P2P, the paper emphasizes the introduction PKI and authentication based on public key certification, PMI and authorization based on attribute certification, researches the access control model based on PKI+PMI, aiming at the characteristics of P2P network. The paper analyses two characteristic of cooperative design-dynamic subjects and vast objects. Through the analysis and compare of three conventional access control model, the paper particularly introduces Role Based Access Control (RBAC), and researches the role model of PMI and how to describe access control policy in XML. Finally the paper describes some programming technologies to implement the CSCD system and access control module, such as COM/DCOM, ATL, ObjectARX and DOM.According to the related theory researches and analyses, the paper brings forward a new concept-workset and XML schema to describe access control policy based on role. The paper constructs PMI and combines it with PKI of Windows 2000 operation system, implements an access control model of CSCD based P2P network. To verify the access control model, the paper implements cooperative design module based AutoCAD.At last, the paper discusses the conclusion and future work aiming at the shorts.
Keywords/Search Tags:CSCD, Peer-to-Peer, Access Control, RBAC, PKI, PMI
PDF Full Text Request
Related items