Font Size: a A A

Research And Implementation Of J2ee Security Policy

Posted on:2006-09-30Degree:MasterType:Thesis
Country:ChinaCandidate:X S WangFull Text:PDF
GTID:2208360152991953Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology, especially the Web mainstreamism, the enterprise application system is gradually transforming its state from isolation to openness, while the information resources that enterprise application is faced with depend more and more on the Web environment, and therefore increasingly complicated security administration has become a tough problem deriving from the network application system based on the J2EE enterprise application system. This dissertation first introduces J2EE enterprise application characteristics and its system structure, then deeply analyses and introduces the JAVA2 security system structure, last but not the least, with a project as the background, combines requirements and characteristics on the basis of the J2EE enterprise application security protection in order to divide the application system of security problem into three layers: the application software layer, the system software layer and the physics layer. Then these security measures adopted in these three layers are systematically integrated into a stable, reasonable and sound J2EE enterprise application security strategy. A combination of the application software layer and the concrete projects is the most appropriate security protection measures for the customer, which is utilized for the protection of the enterprise application software itself in the layer. The dissertation adopts power management system based on the role in order to ensure the normal operation of the system. The system software layer is involved in the security of system software, such as the application server, the Web server and so on, and in this layer security protection is mainly responsible for the data security of the enterprise application. The security problem is considered from the physics layer, in which the security protection is mainly responsible for the protection of the most basic and also the most fundamental security protection in the application environment. This dissertation adopts the strategy of combining the fire wall and physical isolator techniques, especially the introduction of the latter to make the role of the security system change from the passive defense stage to the active protection one so as to considerably enhance the security of the system. With the three layers' security measures mentioned above, this dissertation conceives and develops a set of highly-reliable and applicable security strategy, which is important in setting up security protection based on J2EE enterprise application.
Keywords/Search Tags:J2EE, Java Security Architect, Privilege Administration Based on Roles, Data Security, Physical insulator
PDF Full Text Request
Related items