Font Size: a A A

The Improvement And Implementation Of Distributed Security Policy Model

Posted on:2008-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:W W MaFull Text:PDF
GTID:2178360242967325Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Software technology is undergoing a transition from monolithic systems, constructed according to a single overall design, into conglomerates of semi-autonomous, heterogeneous and independently designed subsystems, constructed and managed by different organizations, with little, if any, knowledge of each other. Among the problems inherent in such conglomerates none is more serious than the difficulty to control the activities of the disparate agents operating in it, and the difficulty for such agents to coordinate their activities with each other. In the distributed system, security policy problems research not only each security policy per se, but also methods and techniques of security policy integration, realization, validation and maintenance. These methods and techniques don't contrapose any specifical security policy. They are independence of policy or realize independence maximally. That is to say, security policy problems of distributed system mainly research the policy problems of intellectualized integration.We consider the problems of coordination and control for large heterogeneous groups of agents distributed over the Internet in the context of Law-Governed Interaction. LGI is a mode of interaction that allows a group of distributed heterogeneous agents to interact with each other. It breaks though traditional based-roles access-control, and realizes base-rules access-control.LGI model overcome problems of complexity, too many states, difficult reuse during software implement in distributed system. It must be deeply influence in wide application of E-commerce.This article introduces LGI architecture, concept and some base operation systemically. In order to resolve application of security protocol in large heterogeneous groups of agents better, we extend LGI model and resolve more complex problem of protocol enforcement: certificate revocation and protocol superior/subordinate delegation. For the sake of more intuitionistic comprehension, two examples are given.LGI model policy is realized. Started with every component composing of LGI model, particularly design and realize important resolvent of creating and certified controller.
Keywords/Search Tags:Distributed System, Security Policy, Security Protocol
PDF Full Text Request
Related items