Font Size: a A A

B/S Framework Network Security Platform Research And Apply

Posted on:2010-10-03Degree:MasterType:Thesis
Country:ChinaCandidate:X S WangFull Text:PDF
GTID:2178360278975748Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of computer network security, network information management has become an increasing concern. The exploitation of B/S Framework is the first choice for enterprise informationization now. As for the security of application system, there is no uniform international standard to user authority management. Due to different authority management systems in different application systems, enterprises are confused on authority management, which threats information security.Authority management is fundamental to information security. Application system controls user's access to enterprise bases. Privilege Management Infrastructure provides users and application system with authorized management service, maps user identity to privilege, and offers authorization and access control which are irrespective to specific exploitation and management of application system.This thesis improved the RBAC model on the basis of its basic theory: add the attribute certificate to predigesting the authentication function of authority management system. On the basis of PMI theory, it improved the RBAC based PMI model: add the strategy library of access control in authority proving system to control the access to enterprise information, and enhance the local certificate library for increased efficiency of attribute certificate. Applying this model in B/S framed workplace management system provides authority management service for system. As for host authority management and access control in enterprise's inner network, the network security platform adopts SNMP to manage network equipments, obtain their data, such as exchanger and router, monitor the state of host computer, adopt the binding technique of IP-MAC address and host authority, design the platform of host authority management and solve the illegal access to enterprise network.
Keywords/Search Tags:Authority Management, PMI, RBAC, RBAM, SNMP
PDF Full Text Request
Related items