Font Size: a A A

Research And Apphcation Of The Security In Beinei Product Data Management System

Posted on:2012-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:H T YuanFull Text:PDF
GTID:2178330338491486Subject:Mechanical engineering
Abstract/Summary:PDF Full Text Request
The PDM which based on the open Internet network helps to share the product information resources and realize the integration of the manufacturing process between distributed enterprises and even virtual enterprises. In the meantime, the PDM which implemented on the open network environment also will face more severe safety pressure. Due to hardware failure, network intrusion and computer virus, the system is paralyzed and the important data in system is lost, which will cause a irreparable damage to the enterprise. The information security issues of PDM (including confidentiality, integrity, stability and reliability, etc.) are gradually becoming a new hotspot.On the basis of lucubrating the current security status of PDM, the paper designs a set of controllable security model for the Beinei PDM to meet the target of Beinei PDM security, and analyzes various strategies and techniques in the security model. Focusing on two aspects of the data security and access control, the paper gradually verifies the legitimacy of the user, the validity of password, the legality of role and access of classified data by using multi-level control technology, and audits the authorized operation with security auditing technology. Among them, in order to ensure the security of data, the paper employs encryption to guarantee the data security and confidentiality; the paper employs the technique of transaction rollback to avoid dirty data been written into the database; the paper employs the technique of data synchronization to avoid the inconsistencies of information in database because of the competition between the data being written in database. Meanwhile, according to the specific needs of Beinei PDM, the paper presents a new access control model by improving the existing RBAC, and include audit into the model to ensure the creditability of authorized users and prevent the possible "internal threat".The study makes up the security deficiencies of domestic traditional PDM, and applies the latest technology of information security to the PDM. It increases the security, reliability and maintainability of PDM, and safeguards the information security of enterprises.
Keywords/Search Tags:PDM, encryption, RBAC, audit
PDF Full Text Request
Related items