Font Size: a A A

Research On Reflective Information Security Middleware

Posted on:2008-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:H W ZhangFull Text:PDF
GTID:2178360242472354Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Middleware technology, which separates complex security problems from application systems and efficiently improves the flexibility and adaptability efficiency, has a broad prospect in the defense of security of information system. However, with the development of middleware technology, traditional middleware technology is challenged in the fields of mobile calculation, multimedia application, embedded systems and military applications, which requires security middleware to be adapted for limited and unstable system resource environment, fulfill the customer's requisitions for custom-built services and have the ability of dynamic configuration. It is hard for traditional middleware to resolve the problems above due to its inside black-box mechanism and inherent limitations of its internal structure and external behaviors.Based on the researches of reflective middleware, this paper introduced the idea of reflective computing into security middleware design and proposed the RSM (Reflective Security Middleware), which apperceives the change of system resources and customer's requisitions and tries its best to fulfill application requirement through dynamically adjusting its structure and behavior to the changes with the support of its reconfiguration mechanism. According to the characters and requirements of military information system, this paper presents the RSM architecture and its detailed design. After research on reconfiguration mechanism and the configuration policy conflicts, this paper designed the RSM reconfiguration mechanism and analyzed and checked its validity, proposed corresponding approaches and detailed algorithm to resolve the potential configuration policy conflicts and finally realized the RSM prototype system which works all right.
Keywords/Search Tags:Iinformation security, Middleware, Reflected Computing, Reconfiguration, Policy conflict
PDF Full Text Request
Related items