Font Size: a A A

Research On Secure Access To Real-Time Database

Posted on:2012-07-10Degree:MasterType:Thesis
Country:ChinaCandidate:L C LiFull Text:PDF
GTID:2218330362956304Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The emergence of real-time database technology effectively solve such as industrial production monitoring and other traditional real-time applications on a large number of real-time data management. With the application of real-time database continues to expand, in the financial, military and other confidential data related to storage management applications require sensitive data access only by specific users, and not allowed to access any other way. Thus, the research on real-time database access control, and the design of an effective security access control solutions to meet real-time database for secure access needs, are very necessary.Through real-time database security technologies and access control technologies in-depth study, we designed a set of role-based access control model of security access control system. The system uses a separate implementation and design decisions, that decision only based on the results of the implementation of the module to access the requested filter: or not to approve. Decisions are made by decision-making module, which functions with the implementation of modules independent of each other, and interconnected on the process. Decision-making role-based access control module is the model design, and its access rules is the role of authority to follow the rules, its role is defined functional modules.In addition, taking into account the real-time data on the fine-grained user access control requirements, add the license using a set of attributes for the role of the method, providing access control based on group size. Users to access real-time data, first with real-time database-related roles, and the identity of the access to data must exist in the permission set of role attributes, both of which are indispensable. Also, the design is optimized for real-time needs.In order to verify the feasibility of security systems designed to achieve the basic function of the security system, and simulation tests. Test results show that the security system can effectively prevent unauthorized access to real-time database systems, and meet most of the applications of real-time requirements.
Keywords/Search Tags:Real-Time Database (RTDB), secure access, real-time
PDF Full Text Request
Related items