Font Size: a A A

The Research Of Security Modeling Of Information Appliance

Posted on:2011-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z X ChenFull Text:PDF
GTID:2132360305463910Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the times, Information Technology is widely applied to various fields. With the integration of the pervasive computing, communication tech and home appliance tech, Information Appliance is provided. Architecture of Information Appliance is being driven to maturity stage and the concept of smart home is being achieved step by step. In the foreseeable future, Information Appliance industry will become one of the largest consumer hot spot.The application of Information Appliance will greatly improve people's experience and standard of living at home, making family life more comfort and convenience. With the powerful function of Information Appliance, security threats will appear.A dominant architecture of Information Appliance is analyzed in this paper, and the requirement of security of it is a key consideration. A complete security model is set up by us to prevent security attack, unexpected access and other threat. The security model is a supplement of the original architecture, and some necessary modifications are made to the original model.The security model is consisted with three parts:first, security of Information Appliance network, including basic protocols, audit policies of equipments, security of remote access and etc.; second, access control of equipments, including the definition of privilege, identity tokens and access control mechanisms, etc.; Finally, security mechanisms of Information Appliance collaborative model, including pre-auditing mechanism for coordination transaction and secure borders. Security model of the Information Appliance basically covering all aspects of the architecture is a complete solution for the security issues of Information Appliance.
Keywords/Search Tags:Information Appliance, Network Security, Access Control, Transaction Security, Strategic Security
PDF Full Text Request
Related items