Font Size: a A A

Research And Implementation Of Key Technologies Of Information Security Management In Intelligent IETM

Posted on:2018-06-23Degree:MasterType:Thesis
Country:ChinaCandidate:P WangFull Text:PDF
GTID:2348330533962722Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Information security is very important in intelligent Interactive Electronic Technical Manual(IETM).But there are few researches on this problem.The intelligent IETM is used more and more widely.In many important fields,they have a high demand for information security in intelligent IETM.Two key technologies of information security management in intelligent IETM was studied in this thesis.The main contents are as follows:(1)Aiming at the problem that users should access the system resources within their permission,access control technology was researched.Role-Based Access Control(RBAC)model was used in the IETM.Aiming at the limitation of RBAC model,an improved RBAC model which improved from three aspects which are the way of authorization,the size of subjects and objects and the way of permissions inheritance was proposed.The improved RBAC model was formally described.The access control process was designed and the basic management functions of access control in IETM were implemented.The validity of the improved RBAC model in the IETM system was verified by an unauthorized access experiment to ensure that the system resources were accessed legally and under control.(2)Aiming at the problem that the data in database is easy to be leaked,the database encryption technology was studied.Two level key management mechanism was used to protect the security of the key,and the security of the ciphertext can be ensured by the way of adding the strings.The function of banning database file copying on Portable Maintenance Aids(PMA)was designed and implemented.The performance of the database encryption module was tested.The result showed that the replace of master key had little effect on the system performance.The effect of work key replacement on the system performance was increased with the data volume.Inserting and reading data in ciphertext database had little effect on system performance.Which achieved the design specifications.(3)The intelligent IETM system was developed by B/S mode and ASP.net framework.It mainly has four function modules:browsing subsystem,management subsystem,fault maintenance assistant system,maintenance training auxiliary system.The information security management in intelligent IETM was tested to verify the correctness of each function.
Keywords/Search Tags:IETM, RBAC, database encryption, information security
PDF Full Text Request
Related items