Font Size: a A A

Security Middleware Architecture Design And Implementation

Posted on:2008-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:K HuaFull Text:PDF
GTID:2208360215997860Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In modern information society, security problem is an inevitable subject in theinformation construction, and this Problem seems more urgent with wide application ofcomputer technology. At present, due to high technological threshold, big investment, poorusability and weak cooperative ability in security field, these problems have become bottleneck to solve security problem. In such a case, security middleware emerges as therequirement of times. Its design ideas are the combinations of information securitytechnology and middleware technology.It means that separating the security module fromthe whole application system to be as a common software, then both of them becoming aloose coupling relationship. Therefore, it can raise re-usability of software and also reduceof application software's development. The aim of the security middleware is to analyzethe public requirement of all kinds of applications, especially the public securityrequirements of the military system, to provide a frame of the security middleware that canbe used in most of the applications, and to design and implement it as well as to ensure thesystem's trustable and safety.The main content included:1. Basing on the analysis of the security requirement of the applications nowadays,the basically frame of the security middleware is finished. Then a frame model namedNewSecMidWare of the security middleware is provided. There are five layers includingbasic model, security service, security protocols, component services and securitymanagement. It not only supports common applications but also supports mobilecommunication applications. And then we introduce the target, function and design theoryof each part.2. CORBA security service layer extends the concept of the common securitymiddleware, and it provides mutual abilities among security modules in a distributedenvironment. This article studies the model of the CORBA security and provides thesecurity model and using of all the security function. At last, GIOP/IIOP protocols aredesigned and implemented in detail.3. Analyze the requirement of the CSM, discussing the design theory of the CSM, andproviding an implement of CSM.4. Introduce the design of the SSPM simply and at last we analyze one specificapplication of the security middleware.
Keywords/Search Tags:Security Middleware, Information Security, CORBA Security, CSM
PDF Full Text Request
Related items