Font Size: a A A

Research And Design Of Security Protection System In Command Center

Posted on:2011-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:W P ShiFull Text:PDF
GTID:2178330332478461Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the wave of the world's new military revolution, the operational command system is the operational command to run the carrier is to perform the functions of operational command consisting of an organic system, in essence, is a complex information processing system. Command System (System) information is to adapt to the future of high-security information operations command under the condition of the inevitable requirement. There is an urgent problem need to resolve, that under the protection built by many boundary defense how build the defend system of command system. Huge cost and low efficiency are the major difficulties of the most current access control system. And the implement of access control is more difficult and complicated.It researches and discusses the theory and technology of access control, including video surveillance, fingerprint recognition, the concept of access control, access control framework, access control policy, access control mechanism and XACML. And the principle of PMI also is studied, including the concepts and Attribute Certificate in detail.On the basis of the studies above, this paper also designs and implements an access control solution based on the command system of Microsoft.net platform. The main work is listed as follows:1 Design of a terminal resource security protection system, a total of video surveillance subsystem, identification subsystem, distribution of competencies and access control subsystem. All the features of the system are in the form of the dissemination of services to facilitate command and other applications within the network to its call.2 With the XACML language to describe the authorization and access control strategy, and in the system integrated into the overall design of the XACML access control decision-making model of thinking in order to better protection of resources applied to the terminal.3 Use of video surveillance technology to monitor the terminal resources, and its use for the benefit of video archive security audit.4 Using a dual fingerprint identification technology to achieve the user's identity.5 Use XML techniques to improve the encoding attribute certificates. Practical application show that the designed network of command within the terminal protection system can command a better solution to the terminal within the network resource security, fine-grained access and so on, right within the network to improve the security of the command provides a new way of thinking.
Keywords/Search Tags:XACML, Video Surveillance, Fingerprint Recognition, Access Control
PDF Full Text Request
Related items