Font Size: a A A

Research And Realization On Consistency Detection Of Access Control

Posted on:2011-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:X Y BiFull Text:PDF
GTID:2178330332960333Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the continuous development of network technology, the internal network is playing an increasingly larger role, but at the same time, the information leak to the internal network to bring a great security risk. Therefore, computer network security technology becomes increasingly more important, Access Control technology also will be developed.This article first permission to access control technology research background and research described the current situation, and then analyzes technology of access control products, waterproof wall. Pointed out that the current access control products causes the vulnerability, which leads to the main ideas of this article, make access control consistency and completeness of detection.Research the key technology on consistency detection of access control.And research on access control technology in the access control methods, access control policy, as well as the realization of the form of access control.Studying mainstream role-based access control model , task-based access to control model and object-based access to control model in-depth. Lay the foundation for realization of Detection of access control.This article focuses on the content of In-depth analysis of vulnerabilities in access control. For Solutions to address these issues, authority and the relationship between the authorities are defined. Access rules are formulated. Complete access control policy has been developed. And analysis of the consistency and completeness of access control.Finally, according to the design of access control detection carried out to detect instances of access control. Competence of information systems strategy for vulnerability detection, access control model for the amendment.
Keywords/Search Tags:Access Control, RBAC, Security Policy, Permission Rules, Consistency, Completeness
PDF Full Text Request
Related items