Font Size: a A A

A Based Data-Integrity And Access-Control Scheme For Computer Security

Posted on:2005-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:S Z ChenFull Text:PDF
GTID:2168360122987782Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The labefaction of network's security status threatens the security of computer. Inallusion to security problems computer faces, how to enhance the security andcapability protecting computer against attacks becomes a new research hotspot. In this thesis, we analyze the cause, characteristics of network security problemsand the defects in the current security technology based network, and especially studythe effects of data-integrity and access-control on the protected computer. Consideringthe characteristics of security problems and the current security status, we put forwarda scheme for computer security which is based on data-integrity, access-control, andour analysis. The work we have done also includes: Discussing MD5 Algorithm, therealizing principles, virtues and defects of the access control model in Windows 2000;We design and program to realize the main part function of the scheme by using ofC++Builder in Windows 2000. In the end, we also discuss some defects which need to be improved in ourrealization.
Keywords/Search Tags:Security, Data Integrality, Access Control, Registry, Service, Privilege
PDF Full Text Request
Related items