Font Size: a A A

Modeling And Design Network Access Control System Based On RBAC

Posted on:2011-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:L ZouFull Text:PDF
GTID:2178360308952482Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network, it has become an important aspect that people share and exchange information through network in their living and working days. At the same time, the security about user's information, that's how to protect user's personal information and netwok server's resource from being stolen by illegal users, is a very important work. Customers who need high level security, such as financial organization, government, and research institutes, face a crucial situation and need a tool to protect their important information. The research of netwotk access control method is then presented to fulfill this requirement.The thesis takes network access control model and method as its object,and mainly discusses how to establish an effiencient and secure network access control system. Firstly, it demonstrates role based access control model, which is the basic access control model in this thesis, and how to change the element in this model to suit network environment, at the same time, discuss different policy language and their expressing abilty for RBAC model. Secondly, the security analysis problem in RBAC model which analysis the security impact when system state changes is studied. We mainly concern the security analysis problem when role hierarchy changes. In order to solve this problem, an algorithm of converting this problem to a model checking formalism is designed, by using any model checking tool, this problem can be solved effectively. Thirdly, based on the research mentioned above, a network access control system on WEB service is designed, because WEB service is one of the most important applications in network now. Finally, the thesis evaluates and comments on the research domain of the network access control, giving an illustrative description of the ideology that leads the way.
Keywords/Search Tags:Network Access Control, RBAC Model, Security Verification, Communication System
PDF Full Text Request
Related items