Font Size: a A A

Research On Fine-grained Access Control Based On Resource Gateway

Posted on:2013-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:B M SongFull Text:PDF
GTID:2248330392956888Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Accompanied by the development of technology, network application begins toexplosive growth, and this cause that the application aggregation and centralized securitymanagement.The precision access control of resources is the primary issue of the Centralizedsecurity management. Although a variety of access control mechanism can be goodresources throughout the system security, in these ways, each with a shortage. A good ideato solve the problem is make several access control combined to meet the mandatorysafety control conditions. The Content inspection can be used to detect the operating statuswhen the system is running. This feedback at the end of the access control, make thesystem more layer of protection.By the analyze of the application layer protocol about resources, system can resolvethe corresponding URL. Then the system check data content security by the Bloom filter,with the credibility of the dynamic adjustment to change the user’s access privileges.Kerberos framework is used to achieve a single sign-on system, combined with thedynamic safety to implement access control, and that ensure that the system has adequateenough feedback about the user’s access behavior in the time when running.In the s inglesign-on system, users can easily achieve a certification multiple logins at the same timeensure that the individual communication between isolated to ensure the system’ safety,and also the cost of the overall security control can be reduce a lot.The system is created by the LDAP protocal and the bloom filter. Rely on the LDAPprotocol, the system greatly accelerate the access speed of the resources of the URL toimprove the efficiency of the system. Bloom filters in deep content inspection also reflectsthe excellent operating efficiency.
Keywords/Search Tags:Fine-grained Access Control, Dynamic trust degree, Bloom filter, Kerberosframework
PDF Full Text Request
Related items