Font Size: a A A

The Security Research And Implementation Of CWISs In Wuhan University Of Technology

Posted on:2005-06-27Degree:MasterType:Thesis
Country:ChinaCandidate:B XiaFull Text:PDF
GTID:2168360122990447Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Along with the popularization of INTERNET and development of Campus-Wide Information Systems, many universities and colleges have built their CWISs. It has become the important part of the information systems in the universities and colleges.Now WEB has superseded C/S mode and becomes the first choice to access the application programs and data for the customers in the universities and colleges. Along with the construction of the information systems in the universities and colleges, the abundance of the network application is increasingly, the proportion in the administration, teaching, scientific research, logistics service is also increasingly. The increase makes the network administration more complex and insecurity. The risk of deploying the applications in internet is agreed. The trends also increase the complexity in deploying the WEB applications. The trends include the deploying many applications in single portal, the using of Java, the increasing complexity and size of deployed applications. So it is more and more important to solute the security in CWISs. The security include the security hi the information transmitting and access control. The content of this paper is the security of CWISs in wuhan university of technology and its implementing.Firstly, the paper introduces the security demand in the distributing network information system and the technologies in the CWISs and brings forward the topic: the network information security in CWISs based on J2EE application server.Secondly, the paper analyzes the security frame based on Oracle AS10g after introducing the network information system security and the WEB system.Thirdly, the paper analyzes how to carry out CWISs security, such as Single-Sign On, the rules and implementing in accessing resources and authorizing.Lastly, on the basis of the above theory and technology research, the paperprovides a solution of the security in CWISs to using JAAS to implement authentication and authorization.The best feature of the paper is the combination of the theory and practice which is used in the security construction in CWISs in the construction of wuhan university of technology, namely, analyzes the key problems , the authentication and the authorization.
Keywords/Search Tags:CWISs, middle-tier, Single-Sign On, access control, authorization
PDF Full Text Request
Related items