Font Size: a A A

The Research Of Emergency Recovery Mechanism For Classified Protection System

Posted on:2015-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:L Q ZhangFull Text:PDF
GTID:2268330428963323Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The effective solution to the issue of information security is not only related to the safety of the technology itself, but also contains the related laws and regulations etc.. Classification protection system, a strong technical risk control, for information system security is proposed by China, according to the need to classified information system to moderate effective protection. In this paper emergency recovery problem from the perspective of service is studied for classified information system, it has included mainly the following aspects:Firstly, this paper has introduced fully the classified protection system to clear the emergency recovery requirements to classified information system;it also has analyzed systematically the theory of SOA to present the formalized description of service based on the existing emergency recovery technologies from the angle of service.Secondly, this paper has focused on the service recovery mechanism,service recovery P5R model has been put forward,and the structure of service recovery environment system has been designed, and the service recovery process has been summarized.Thirdly, this paper has researched three service-selection algorithms based on different emergency recovery requirements to classified information system, namely the service-selection algorithm based on graph theory, the service-selection algorithm based on information entropy and the service-selection algorithm based on generalized satisfaction.Finally, this paper has set up a test scenario to implement the mechanism of service recovery in Ningxia university campus network, and three service-selection algorithms were test, experimental results and theoretical analysis have showed the rationality and feasibility of service recovery mechanism, and also have verified the reliability and effectiveness of the service-selection algorithms.
Keywords/Search Tags:Information security, Classified protection, Emergency recovery, Service selection
PDF Full Text Request
Related items