Font Size: a A A

Research On Security Mechanism Of Resource Optimization Configuration Platform Of Area

Posted on:2004-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:M Z ZhouFull Text:PDF
GTID:2168360092980216Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Resource Optimize Configuration Platform of Area (ROCPA) which based on network, is wanted to optimize the resource of the area and improve the competitiveness of the enterprises in the area by the area's advantage. The platform is based on the Internet, so it should face all kinds of attacks which are from the Internet. Because Security of the platform self and the data in the platform is direct related to enterprises is trust in platform or not, Credit is the bedrock of the services and security is guarantee of area working normally. Otherwise, the ROCPA is not like the ecumenical Enterprises' Websites, and it has special demands for the configuration of security. From all the above, we can conclude that it is very important to reach the security mechanism of the platform thoroughly.The thesis brings forward the scheme of platform security control, based on analyzing the characteristic of platform security. And then establish the implementary scheme concretely from the two sides -- system security and information security.(1) Platform System SecurityPlatform system security is the base of the platform Security, and gives strongly support to platform information security. The structure of platform system security is determined through analyzing its needs. The platform system security is detail designed from two parts: passive recovery and positive recovery. At last The detail implement plan of platform system security is expatiated from deployment of Firewall and Intrusion Detection System.(2) Platform Information SecurityInformation security is the keystone of platform security. This thesis establishes the structure of platform information security based on analyzing its needs, and probes into the plan and deployment of platform information security control strategy from two parts: information access security control and information transmission security control. Information access security is studied from several ways: information security storage, information access control, useridentity authentication, cipher key management and log management etc. The main which information transmission studied is the selection and deployment of information encryption transmission plan.From analyzing and comparing the parts of information security system, configure scheme is made out, which is established for the concrete configuration of platform information security.In the end, a kind of identity authentication technology fitted for the platform is brought forward, which is expatiated in the user identity authentication strategy. And function modules of the foregoing are implemented which is supported for the platform identity authentication strategy.This thesis serves the national 863 planned project -- "2001AA411320 regional modern integrated manufacture system development and application at the core of Chengdu, Deyang and Mianyang". The group of experts organized of national 863 plan has checked and accepted the project.
Keywords/Search Tags:Resource Optimization Configuration Platform, System Security, Information Security, Security Strategy, Identity Authentication
PDF Full Text Request
Related items