Font Size: a A A

Design And Implementation Of Security Middleware And Related Modules

Posted on:2003-06-19Degree:MasterType:Thesis
Country:ChinaCandidate:L XuFull Text:PDF
GTID:2208360065451113Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Information security is an inevitable problem of network application. Und'er modern network environment, network is used more and more widely, so this problem is becoming more immense. The cost, the availability and the interoperation of information security have become the bottleneck of information security solution. The security middleware emerges in this situation. It combines the security technology with the middleware technology, separates the security module from the application software and become common usage software, thus improves the reusable of the software. The security middleware project's target is to analyze the public requirement of various application systems, especially the electronic business system, to provide the corresponding security service interface solution, and to research the security middleware technology adapting to Chinese situation, to ensure the system's trustable.In this project I took part in the designing of the architecture of the full security middleware, took charge of the designing and development of the Common Security Manger (CSM) and Common Security Program Interface (CSPI), designed the Cipher Service Provider (CSP) and Certification Service Provider (CertSP) among the Security Service Provider Modules (SSPM). These parts lie in lower layer in security middleware, are the most important kernel and foundation.The CSM is the kernel module among the parts of security middleware, its responsibility is to manger the security service provider module, to provide a common interface to user, to hide the difference ofvarious security implement, to dispatch the user's request to SSPM, to ensure the system can run steady, as well as it's basic career of the security middleware's function and characteristic. CSPI provide the user an interface to call the service function of the CSM. The SSPM provide the concrete implement of security service function, e.g. cipher, certificate and so on.This topic includes the following content:1. The background of security middleware and main content of information security.2. The architecture of security middleware, and the target, function and design theory of each part.3. Analyzing the requirement of the CSM, discussing the design theory of the CSM, and providing an implement of CSM.4. The design and implement of CSPI and SSPM.
Keywords/Search Tags:Information Security, PKI, Security Middleware, X509, CSM, CSPI, SSPM
PDF Full Text Request
Related items