Font Size: a A A

Dependability Control Mechanism For Intranet Information Security

Posted on:2012-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:X T YangFull Text:PDF
GTID:2178330338992490Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The essence of intranet information security is the effective management in the whole life cycle of network information and data flow, ensuring that information privacy, usability, integrity, controllability and non-repudiation. The existing intranet information security technology is mostly relying on the internal network system in certain safety protection mechanism and implement boundary defense,which is hard to protect the dual demand with"prevent outside"and"prevent inside"in the aspects of information privacy, usability and controllability.According to the current increasingly serious leakage and loss issues of confidential information in intranet with the development process of information in China, and aiming at the information security requirement in intranet, this paper based on the dependability computing platform, studied a dependability model, dependability access control mechanism and encryption and decryption authentication in dependability access control, designed an intranet information security dependability control system, and realized the prototype system. The concrete content includes:1. A dependability computing platform of intranet information security. According to the security requirements of user's identity, behavior and contents, and analyzed the dependability computing platform principle mechanism,combined with the definition of dependability computing and its basic attribute, the dependability computing platform module TPM(Trusted Platform Module) and put process trusted chain are applied to the intranet information security system. Through the dependability chain transmission, it ensures that the data transmission and storage in the whole intranet is credible.2. An intranet information dependability model based on access control. According to analysis and comparison of traditional access control, combining dependability computing environment and aiming at realizing the intranet information security control, a dependability of access control authentication model is proposed, this model with the management of reference monitors which ensures the dependability of access control subject and object, preventing the possibility of stealing the information by dishonest subjects.3. Dependability access control mechanism based on dependable resource. According to the dependability authentication model, and aiming at the secure storage and transmission of intranet information, the dependability access control mechanism is studied by integrating the establishment and production of the dependable root USB Key. Credible authentication process and encryption authentication in credibility access control, studied intranet information dependability access control mechanism, the secure access and storage of intranet information is realized.4. Design and implementation of dependability intranet information security system. Based on the dependability computing platform and dependability intranet information model, protecting documents from the bottom,and by the comprehensive utilization of user machine trust chain, dynamic decrypted and encrypted technology and access control technology, design and realizing the dependability intranet information prototype system.
Keywords/Search Tags:dependability computing, network security, access control, dynamic encrypting and decrypting, file system filter driver
PDF Full Text Request
Related items