Font Size: a A A

Application Software Security Access Control Layer Of Interlocking Pieces Of Technology Research And Applications

Posted on:2009-12-31Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhaoFull Text:PDF
GTID:2208360272958956Subject:Software engineering
Abstract/Summary:PDF Full Text Request
For the past few years, the crime rate of the computer science grows every year. It is very important to research the new technology in the software security for the people. How to expand the new thought in the module of the software access structure, improve the software's reusability by the access control layer, defense the destruction and threaten in all directions, and ensure security, integrity, usability of the data, has become new hotspot in the field of the software security.This treatise provides the structure of the software access layer and researches its implementation, interface by fully analysis the weak point of the existing software security technology. In the existing software security system, it is weak to defense the attack of intercept data packet, therefore, this paper puts forward a new technology, interlink lock, which double encrypts the data packet by using the access control layer as the secondary source, and researches its encrypt arithmetic, structure, result and implementation.This paper is divided into 5 chapters altogether, chapter 1 a part of the introduction, has narrated research background, research current situation, and structure of the treatise. Chapter 2 researches the application of the security access control layer. Chapter 3 explains the concept, design and module of the new conceive 'interlink lock'. This chapter also analysis it's arithmetic, apply, relative merits and feasibility. Chapter 4 is the test and implementation of the technology in chapter 2 and chapter 3. Chapter 5 narrates the conclusion of studying and look into the distance.The 'interlink lock' in this paper is an innovative technology. It has the good security, high efficiency, and practical value by research and test.
Keywords/Search Tags:software security, access control layer, interlink lock
PDF Full Text Request
Related items