Font Size: a A A

A Support Devices On The Network Security Access Control Method And Its Application

Posted on:2007-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:G H LiFull Text:PDF
GTID:2208360185954132Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As the development of Internet technology pushes many tasks and routines online, working efficiency has been accelerated greatly, and research work are greatly improved through adopting new technology in traditional filed. Online Collaboration is a rising research topic, which aims to fully exert the advantage of the Internet, and to create a virtual network environment for organizations to collaborate more efficiently. Remote device control is one of the most important subjects in Online Collaboration, especially it plays a foundation role in the Online Collaboration Research. There are two most challenge questions in this topic. First, how to find an effective access control method for device, so it can build a steady foundation for device management. Second, in order to satisfy the device's heterogeneous feature, how to find a wide usable model for device accessing. Research on this topic both in China and other countries still confine to the method and theory on how to create specialized accessing and sharing method for different devices.Real time control is a basic feature of Remote device access, when involved in Online Collaboration Research, for effective management of device, other services such as device registration, editing and deleting should also be supported. Based on this, we assorted devices into two kinds: devices cannot be controlled by computer programs and can be controlled by computer programs. In refer to the present research and for the convenient of adopting mature information technology, our research object is set to the second one. During the research on computer program and its feature when operating a device, we find it has the following features: Time dependent, Privilege Difference, Access Capacity and Process dependent. To satisfy those features, this paper present a remote device access control model-RDAC which can fully describe and bring into effect access control for device, it is also accord with the least privilege and the separation between privilege and responsibility principle. Based on this model, we build a security remote device accessing and sharing framework which support easily replace and extend of embed security technology, dynamic device resource management, centralize management of security sub network and provided a unify information channels.This paper contributes the following points. Firstly, present a remote device access control...
Keywords/Search Tags:collaboration research, remote device access, access control, device sharing, access control model, remote device access control
PDF Full Text Request
Related items