Font Size: a A A

Research On Architecture And Security Technology For Web-based Cooperative Product Development System

Posted on:2003-11-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:J B HaFull Text:PDF
GTID:1118360062976506Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Shaped by the globalization of the economy, the new market trends are forcing enterprises to be agile and achieve world class manufacturing levels. The current situation promotes the concept of cooperative work worldwide. With the rapid spread of Internet, the Web (world wide web) enabling cooperative product development system and its security technology become one of the research hotspots in the field of manufacturing. This paper aims to discuss the issues that arise in the design & implementation of such web-based cooperative applicationsFirstly, This paper illustrates the requirement of a framework for cooperative product development system. A three-tier, middleware-based architecture for web applications is discussed. The methods for the deployment of web applications both in client and server side are highlighted.Security in a networked information system is a very complex task that ranges fonn the level of crypto-primitives over crypto-protocols to the level of organizational matters and legislation. According to the information security requirement and security policy of a cooperative environment, an information security model is shown and three key security mechanisms are discussed in the following part.Authentication is vital in a cooperative work system. An authentication server provides a sen ice in the system to verifying whether a requested subject is genuine and also for the identification of every involved information the participants required. User identification and message authentication are two important aspects of network security. An interactive /.cro knowledge proofs based user identification and also a cross-domain message authentication scheme are proposed in the paper.Assuring optimal security of a distributed system is not a trivial task, as it requires a wide variety of expertise from technological to organizational. A technique addressed the problem of security policy is given in this paper. It provides the possibility for addressing it at the system design stage & is interfaced to existing formal specifications and verification methods. Tins paper has also shown how access rights can be derived from a Petri net workflow dynamically. Access rights arc granted according to the state of the workflow. The concept of workflow is defined by Petri nets which oiler a solid mathematical foundation.Secure data transmission is an important feature for a distributed information system. Scalable secure group communication plays an important role in a cooperative work process. It poses several unique security problems, namely group membership control, scalable key distribution to a dynamic group and secure data transfer. In this paper, a dual encryption scheme for secure group communication by using hierarchical subgrouping to support scalability is proposed. The correctness of the provided protocol is analytically proved.Finally, A prototype named eCWS (electronic cooperative work system) is implemented. It is an internet-based system for geographically dispersed teams to collaborate over the Internet in both synchronous and asynchronous models for the purpose of integration in design and manufacturing. It is proved that the system has promising perspective.
Keywords/Search Tags:cooperative product development, web-based, information security, Authentication, access control, secure communication, encryption key
PDF Full Text Request
Related items