Font Size: a A A

Design And Implementation Of User Authorization Management And Access Control Technology In Network Management System

Posted on:2007-08-23Degree:MasterType:Thesis
Country:ChinaCandidate:L YuFull Text:PDF
GTID:2178360272477988Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Network resource can be shared expediently through computer network,however the shared resource and information security are a pair of contradiction.As the more resources are enhanced to be shared with,the more security questions gone with stand out increasingly.presently,safe technology contain Cryptography ,Access Control, Authentication,Intrusion Dection, Risk Analysis and protection and so on. Identity Authentication, Authorization Management and Access Control are the both very import sides in the network application security.wherefore they become the research hotspot ininformation security field.This paper researches the user authorization and access control technology. Firstly,the dissertation narrates the development and present state of user administration and correlative techniques, focus on the role-based access control. This paper also research the Public Key Infrastructure (PKI) and Privilege Management Infrastructure (PMI) ,then build the PKI/PMI unite authenticatin system.The role-based access control technology is adopted in this paper.After that we particularly introduce the infrastructure of JAAS, the components of it and the API's (the classes and the interfaces) functions. Our system is built on the basis of JAAS, we design the user,roles and authorization ,particularly design the landing module and authorization management module,then testing the result. This paper implement the application of user authorization and access control technology in the UEMC system.
Keywords/Search Tags:access control, Identity Authentication, Authorization Management, Java Authentication and Authorization Service(JAAS)
PDF Full Text Request
Related items