Font Size: a A A

Research And Implementation Of Document Protection Mechanism

Posted on:2013-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y LiFull Text:PDF
GTID:2248330371985368Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of information technology, the Internet is increasingly high. web2.0information processing model has been gradually unable to meet the needs of users, peoplewant a new change.The2000World Wide Web founder Tim Berners-Lee on in XML2000Conference, fornow the World Wide Web expression search of defects of the concept of next-generationWorld Wide Web-the Semantic Web, and this is now we are talking about web3.0. of microunits (micro-module, or unit organization) web3.0web3.0under the user can create owninformation module, and intelligent integration of the Internet according to their needs, vastamounts of information. web3.0resources, the RDF graph can be very flexible to achieveinformation sharing. However, Web3.0, to achieve resource sharing, some privateinformation about users (such as the user’s bank account, the user some backgroundinformation, etc.) is very possible leakage of such sensitive information to only certain userscan access.Focuses on the technologies of authentication and access control and documentprotection mechanism was studied, which has made its due contribution to user privacyprotection.First:Authentication, the analysis of several typical authentication protocol, and makefull use of the advantages of the Kerberos authentication protocol, the introduction of the roleidentity to Kerberos, and this specific authentication protocol method is applied toinvestigate.Second:In access control technology, the role-based access control (RBAC)technology research and analysis, the structure of government departments, user groups,introduced into the RBAC model, simplifying the role of the organization and managementproposed to improve the RBAC model. Not only improved RBAC model supportsauthorization of role, and support to authorized users and groups, making the model moreflexible licensing.
Keywords/Search Tags:online privacy protection, authentication, access control
PDF Full Text Request
Related items