Font Size: a A A

Researches On Key Issues Of Security Middleware

Posted on:2007-10-06Degree:DoctorType:Dissertation
Country:ChinaCandidate:S J XiangFull Text:PDF
GTID:1118360185456743Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In modern information society, security problem is a unevadable subject in the course of information construction, and this problem seems more urgent with wide application of computer technology. At present, due to high technological threshold, big investment, poor usability and weak cooperative ability in security field, these problems have become bottle neck to solve security problems. In such a case, security middleware emerges as the requirement of times. Its design ideas are the combinations of information security technology and middleware technology, it means that separating the security module from the whole application system to be as a common software, then both of them becoming a loose coupling relationship. Therefore, it can raise re-usability of software and also reduce difficulty of application software's development.The theme of this paper's research for security middleware is to research its key technology, its main contents contain: system structure of security middleware, application programming interface and key protocols, multi-thread concurrent scheduling algorithm and security load balancing algorithm etc..This paper is a comprehensive summing-up to author's research work. Its main creative work includes as follows:(1) Putting forward a new architecture model of security middleware ——NewSec architecture modelSecurity middleware has either security function or middleware function. It aims at our country, especially, our army's actual condition. It has put forward a new structuralmodel of security middleware——NewSec architecture model etc.There are five layersincluding basic model,security service,security protocols,conponet services and security management. Especially, several important security modules in the security middleware: CSM module of universal security management device, RIS module of resource information server and partial modules of CORBA security, and the deep research and detailed explanation have been made.
Keywords/Search Tags:Security Middleware, NewSec Architecture Model, Security API, NewSec Concurrent Scheduling Algorithm, NewSec Load Balancing Algorithm
PDF Full Text Request
Related items