Font Size: a A A

PKI Design And Implementation For The Security Of Information System

Posted on:2007-03-24Degree:MasterType:Thesis
Country:ChinaCandidate:F W JiangFull Text:PDF
GTID:2178360185974845Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
By the fast development of computer technology and Internet, the security problem of isolation information system and the system on Internet is increasing severity. The proclaimed message inside or outside the local area network is easily wiretapped, tampered and forged. The integrality, confidentiality and usability of data cannot be ensuring effectively, which threaten the stability of the system directly. At present, aside the mass research of the standard of information security aboard, the main attention is on the product for the security of information system. Our contry is still lack of the unified design pattern and standard for the security of information system. In the face of the increading severity security problem, we need an effective security mechanism to ensure the information sytem running steadily on edge.Public Key Infrastructure (PKI) is a synthesis security platform based on the public key password theory and technology and a universal information security infrastructure. It coule bind the public key and identified information of the customer by the third trusty institution, Certificate Authority (CA), and provide information security service for the network customer and equipment.This thesis has carried on the research of the PKI design and implementation for the security of information system. The PKI technology has been used in the information system, in order to provide security platform for the steadity of the system.This thesis discusses the main threaten of information security, analyzes the speciality of the PKI technology by the numbers, puts forword a design method for the security structure of information system according to the national correlative stardard of information security building, and provides the design and implematation. Summarizing, this thesis has carried on the research of the following several content mainly:①It analyzes the basic structure of PKI, and studies the framework design scheme of CA/RA.②It analyzes Role-Based Access Control(RBAC)model and the usages of digital certificate, and studies the access control strategy of RBAC digital certificate.③It analyzes the advantages and disadvantages of RBAC basic authorization,...
Keywords/Search Tags:PKI, Information System, Digital Certificate, CA/RA, Access Control, Authorization Strategy
PDF Full Text Request
Related items