Font Size: a A A

Research And Implementation Of Security Management System For Broadband User

Posted on:2006-07-30Degree:MasterType:Thesis
Country:ChinaCandidate:Q FanFull Text:PDF
GTID:2178360185463469Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the information technologies, people have enjoyed the convenience brought by the information technologies. At the same time, people have to be confronted with the serious crisis of information security. Information security has brought the high attention of government, enterprises and individuals. At present, the research and application of information security technologies has become the hot spot of computer science. As one of the important aspects, broadband network security management technologies play an important role in the people's research of information security technologies.In the recent years, both the government and the ISPs have putted a great deal of investiment in the construction of backbone network. Furthermore, government departments, colleges, enterprises and uptowns began to set up their private broadband LANs in order to share information resource. Those private broadband LANs facilitate the sharing of information resource, enhance the managemenr efficiency and provide a lot of information services to users. However, private broadband LANs also bring us many information security problems. Because of lacking of necessary management measures, private broadband LANs are vulnerable both by the outer networks and the inner nodes, which result in the leak of important information. As a result, it is the time for us to strengthen the management of private broadband LANs.Fighting against the information security problems of privat LANs, BNUISMS (Broadband Network User Intergrated Security Management System) combined software technologies with the hardware technologies and integrated a lot of mature and effective information security defence measures with the trend of the blend of information technology. Otherwise, BNUISMS introduced the concept of orient terminal trusted computing which is the trend of development of information security technologies. By strengthening the defence ability of terminal, BNUISMS enhanced the whole system's security defence level.Based on the BNUISMS, we gave emphasis on the research of some key technologies of the LIB-NACE, which is the key device of BNUISMS. This paper concretely described the mechanism and implementation algorithms of LIB-NACE.Based on the PKI identity certification and data encryption technology, we proposed a security certification and channel-based data encryption mechanism. This paper discussed both the security certification and channel-based data encryption in detail. A prototype system was also built.
Keywords/Search Tags:information security, private broadband LAN, network management, orient terminal, reliant computing, PKI, security certification
PDF Full Text Request
Related items