Font Size: a A A

Design And Implementation For Auditing System Of Security Based On X-windows Under Linux

Posted on:2006-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:X S HanFull Text:PDF
GTID:2168360155453204Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of Linux technology, the application and influence of Linux are more and more extensive and far-reaching, from tabletop to server, can feel this from the scattered first meeting embryonic form applied to the whole industry from operating system to embedded system, X-windows is paid attention to more and more the desk-top system of Linux by people too. Linux has already become one of the generally acknowledged powerful , popular , competitive operating systems gradually, we were experiencing the exciting change of Linux operating system constantly in the past few years: Function of it more and more strong, use more and more convenient, application program more and more abundant, application program have more and more more developing instruments even. The stability and security demonstrated in Linux system become focuses that application software get to care about either, how to design and develop a application program with good stability , security and become the focus that numerous developers focus on fast. Require the higher security in some environment , need the control system user's authority (include system manager ), use X-windows system of Linux itself to be unable to meet this kind of security feature demand, require us to develop one's own figure interface procedure , to achieve the goal. To shell procedure under Linux, powerful, not easy to control, in order to meet safe performance, we choose the use of shielding shell, operate the system directly with X-windows. Just in this case the application system that this text describes, the auditting system of security under Linux is designed and realized. Auditting system of security to expecting relatively much safely , need to exercise restraint in visiting systematic personnel and authority strictly, and rigorously enforce the security of the security system. This text discusses the scheme of the systems soft ware mainly and realizes concretly. As to auditting ystem of security, divided into two major functions mainly, auditing and management . corresponding different users of different functions, authorities are different too. Based on the easy using of system , we choose to use X-windows system under Linux to realize, in order to ensure the systematic security , forbid shell log-in and some operation that may influence the system to be safe of users', such as shielding, file of system, file is it write control of authority ,etc. to read. Auditting system use three layers architecture, every layer finishes one's own functions, layer is and relatively independent between layer. Benefit afterwards systematic function expand or demand that data move too like this. One layer of one that finished with userses of user's interface is mutual; The main function of one layer of implementation systems of intermediate business logic, play a role in linking up user's interface storey and data to store layer; The data store layer and finish save of the data, and return to user interface layer the data got . The figure user's interface of this system uses GTK + develop and charter developing . GTK+ toolkit , user of interface under the Linux , write by C , seal containing X-windows ground floor function Xlib among them, and its component is abundant , the mechanism based on the signal and function of adjusting back totally accords with and faces target's procedure design theory, can be used in developing the figure user's interface fast. The intermediate business logic layer is finished by standard C procedure ,regarding function as the standard of dividing will divide the module to the system, every module finishes the relatively independent function. Backstage supporter's database uses Oracle, visits to the database with PRO *C interface that Oracle offers, and has carried on module encapsulation on this basis, compile and become and chain the storehouse way dynamically, for other module to transfer, it is convenient to use, and apt to arrange it by mistake. Of the development of the system , have used the main technology of language procedure making of C under Linux environment, including much thread, the signal amount controls, the shared drive is used etc.. Problem including figure interface of GUI and connection of the database , interface Chinese content show , systematic realization that authority controls ,etc. that solve mainly. The connection of the database has adopted the independent module , through transfering this module and not spreading into the visit task of finishing the database the parameter directly in the system. The Chinese content of the interface shows i18n characteristic of using the operating system to offer, initializing stage to set up relevantly in the procedure, reading the corresponding resource file can be finished. Systematic control of authority finish by corresponding module in the procedure, mainly through user materials form , system authority form and authority control data analysis of form finish to database. Originally auditting system of security , stability safely, offer the friendly figure user's interface to user, finish the necessary function , is worth using. Meanwhile, the system has expansibility, can increase the new function according to the needs of reality , in order to meet the new demand or new environment. To the similar system , there is certain reference value too.
Keywords/Search Tags:Auditing System, Linux, X-windows, GTK+
PDF Full Text Request
Related items