Font Size: a A A

Security And Confidentiality Research Based On The Centralized Storage Of The File System

Posted on:2013-06-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y LinFull Text:PDF
GTID:2248330371487100Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of the network technology, computer and internet has become the center of science activities for researchers. Although the internet brings the convenience to researchers, the leaks occurs frequently in computer and network fields. How can we guarantee the security become one of the most important issues. This paper is mainly about Local Area Networks (LAN) files security management system which includes:switches, switch controllers, servers and server controllers. Research units can control the network access to ensure the network access security, internal and external network into account, the dual network the flexibility to switch and sensitive information confidential purposes, to provide security for all terminals of the security domain. This system combines hardware and software, using "information rights management, centralized storage, unified management and control, secure access to terminal trace, comprehensive tracking, auditing, leak",flexible and fully customized and implemented a variety of security policies to achieve the safety management of sensitive information. A file which centrally stored on the server includes confidential documents, user-related information and file attributes, and so on; The system uses role-based user rights management mechanism, flexible tube to control the users’operations. Once the user has been granted a particular permission, the users’sensitive information stored on the server in accordance with the authorization rules to determine which information can be accessed, or what information can be modified. Authorization rules, Access Control List (ACL) to specify the access control list to customize the configuration by the user role permissions in the web configuration management, such as:the group shared file read-only, the group shared file read and write, all sharing file read and write, bring out the file, delete files, send e-mail, transfer files, audit log permissions.
Keywords/Search Tags:internal network security, dynamic controller, switche, SambaFreeNas
PDF Full Text Request
Related items