Font Size: a A A

Distributed Security Policy Deployment Model

Posted on:2006-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:P LiuFull Text:PDF
GTID:2208360152482223Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The development and popularity of Internet have provided great convenience for high-efficient sharing of global resources and information .With the widely establishing of large scale and distributed information system, and the rapidly developing of information society, the application form of the computer becomes the form of the network gradually, the network security faces the new challenge too. By the look of great respect, the network security question has already threatened various kinds of fields, such as politics, economy, military affairs of the country, etc. By the look of small respect, the network security question is a key whether people could protect one' s own individual privacy too. However, the threat of the security has not disappeared because of this. On the contrary, because of the popularization of network application and complexity of the network business, while the network is bringing more facilities to people, may bring enormous threat and loss too. So, there are important meaning and wide prospect in the further research and development of the safe practice of the network.The requirements for network security architecture of current situation identified above can be satisfied through the solution based on policy-based management approaches. By using the policies to realize the management of distribution, automation and dynamic adaptation of the behavior of the managed system, Policy-based management has recently become the most rising research direction of managing enterprise-wide networks and distributed systems.An object-oriented distributed security model is proposed in this dissertation, based upon the research on the content, configuration and forms of the security policy, combined to the analysis of the centralized access control model of PPTR, and specify the technological main point of this model.At the last of the dissertation, we demonstrate an instance of the model in an Intranet, and through theory analysis make objective assessment with relevant test data to the application instance of this model.
Keywords/Search Tags:Security Policy, Deployment Model, Access Control, Distributed
PDF Full Text Request
Related items