Font Size: a A A

Waa Protocol-based Access Systems And Realization

Posted on:2012-03-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2218330368998235Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Network access technology is the key supporting point for the network access control technology, Endpoint Admission Control Scheme which supporting on the Web mode is the difficulty for the access authentification. This paper, base on the safe point of terminal access, to analyse the network security problems of intranet. To insure the network access terminal security is the key to solve the intranet security problems. The trusted network points a thought to solve the intranet security problems from the terminal. Network access control is an effective method to guarantee the network access terminal security. On the base of current analysis of mainstream network access control structure, to consult the trusted network access structure which proposed by the trusted computing group, combining the original authenticating and accounting system and then to lead a integrated terminal security scheme——Endpoint Admission Control Scheme, and provide the application model, system architecture, certification process and implementation framework, solve some key technology problems, and obtain worthy achievements.The main works for paper are:1) Designs the application mode and architecture for Endpoint Admission Control Scheme, and makes a detailed discussion for the scheme's security authentification procedure and system implementation framework.2) Analyse the implementation scheme of Web access authentification system, design the system' composition structure, access authentification procedure and implementation framework.3) Design WAA protocol,WAA private protocol and WAA+ protocol. From the protocol framework, message definition and message interactive procedure, make a definition of each part interactive logic of Web access authentification system.4) Achieve Web access authentification system, and make a system test. Web access authentification system is examined and placed in operation. Its performance can meet design requirement.
Keywords/Search Tags:Intranet, Network security, Trusted network, Network access control, Web, Access authentication
PDF Full Text Request
Related items