Font Size: a A A

Information Integration And Access Control Based On AVIDM Domains

Posted on:2007-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y M SongFull Text:PDF
GTID:2178360218457273Subject:Computer applications
Abstract/Summary:PDF Full Text Request
In order to improve the early implementations of information integration based onAVIDM3.0 federal systems which lack in expansibility,flexibility,interoperability andSecurity, we re-design and implement a new model based on the Web Service architectures.We introduce a concept named "AVIDM Domain" to implement the informationintegration based on federal systems. AVIDM Domain is a set of AVIDM system which isindependent and self-government, this system has its own database management system,user organization model and Authentication-And-Authorization(A&A) system, etc. Adomain generally locate in an independent local area network (LAN), it has its ownfirewalls and security policies. Usually, a domain correspond to an independent Enterprise.At first, the history and present status of Enterprise information integration is given,and then the study objectives of this thesis are presented.In the second chapter, on the basis of the application requirement and networkenvironments between the Department 1 of Chinese Academy of Launch VehicleTechnology(CALT) and Factory 211 of CALT, we propose a solution based on applicationservice agent. Then we analyze the advantages and disadvantages of the main distributedtechnique (CORBA, DCOM and Java RMI). Subsequently, we fully introduce thebrand-new distributed architecture-Web Service, specialize the reasons why we select WebService, and then propose the model of information integration between AVIDM3.0domains. In the third chapter, The detailed design and implementation is given.In the fourth chapter, we discuss the issues about the security in the informationintegration between AVIDM3.0 domains. The following two issues should be considered:1) Access Control mechanisms: Only the users who have legal authentications canprocess the corresponding operation.2) Encrypt the transmitting information: To avoid the wiretapping and forgery over non-safe networks.After a brief analysis on the second issue, we emphasis on the analysis,design andimplement of the access control mechanisms.In order to prove the model's applicability, in the last parts of chapter 3 and chapter4, some example of application was given.At last, we summarize the paper and give some deep research fields in the future.
Keywords/Search Tags:AVIDM, Web Service, AVIDM domain, Information Integration, Access Control
PDF Full Text Request
Related items