Font Size: a A A

A Study On Object Signature Technology In Network

Posted on:2002-03-31Degree:MasterType:Thesis
Country:ChinaCandidate:F Y WangFull Text:PDF
GTID:2168360032457007Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of network and its wide use, people now pay more attention to the security of computer information system. The network is liable to be attacked by the hacker and virus because of the fluidness of information, the distribution of resource, the opening of connection and diversity of connection forms. So the security problem is become more and more serious. The thesis introduces the principle and development of Applied Ciyptography, Encr,ption and Digital Signature. It also introduces the thought and technology of the Object-Oriented methodology. With the development of the Object-Oriented technology and distribution application, Object-Oriented communication has become popular. Secure-Object is a guaranty for this mechanism. Secure-Object is based on the normal network object It results from the integration of security and network objects. The thesis integrates the property of network object ,security aim and abstract the security property, method and realize the access control of the security object with ACL (access control list), based on the analysis of the network security model with Object-Oriented method. It encapsulates the property within the objects according to the different rules in different domain to ensure the security of object. With the technology of enciyption and digital signature, the signature is given to the ACL, secure property by the owner of the object in order to create a complete Secure-Object. The security interface must be called when the object is used. The interface can judge if a user has the right to access the object and so on. So it protects the secure access to the object At last, this thesis tries the method referred above on a example of a system for the transfer of official documents and succeed in doing so.
Keywords/Search Tags:network security, security objects access control, digital signature
PDF Full Text Request
Related items