Dissertation > Excellent graduate degree dissertation topics show

Research and Implementation of Embeded Web System Security

Author: JiangPanPan
Tutor: ShenSuBin
School: Nanjing University of Posts and Telecommunications
Course: Applied Computer Technology
Keywords: Embedded Web System Authentication Access Control
CLC: TP393.08
Type: Master's thesis
Year: 2012
Downloads: 23
Quote: 0
Read: Download Dissertation

Abstract


With the rapid development of embedded technology and Web technology , the embedded Web system for its convenience , practicality is widely used in various fields , more and more embedded devices can be accessed via the Web and control , as well as with to many security risks and complexity of resource management issues . This paper studies the embedded Web system security issues . To an actual embedded Web system as the research background , embedded Web system faces major security threats as well as the appropriate defensive measures , designed to access before the visit and after the visit to the three stages of the embedded Web system access control model. Considering safety , cost , and the difficulty of the factors , the design of the human-computer interaction class based on the IP address and user password authentication mechanism to improve access security , and divided depending on the security requirements for Loose , strict and single-user - access patterns . Add cookies and session - based packet propagation authentication mechanism through comparative analysis of several traditional access control models , role-based access control model based on page views , refined service call and access control granularity , while introducing role inheritance , the commission authorized some control mechanism , increase the flexibility of the authorization at the same time improve the access control security , to reduce the complexity . Operation logging user access process safety management after access to the user 's operating behavior . These access control model , and provide a functional service call interface . The test results show that the various functional modules of the model can be correct , efficient , stable job .

Related Dissertations

  1. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  2. Research on Transparent Security of JPEG Image,TP391.41
  3. The Design and Implementation of DICOM Middle Software and Access Control Model in Formation Integration Platform,TP311.13
  4. The Design of Computer Forensics Model Based on Windows Log,D918.2
  5. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  6. Study on the Access Control of the Court Information System,TP309
  7. Study on Legal Issues in Concluding Electronic Commerce Contract,D923
  8. The Design and Implementation of Higher People’s Court Website That Based on Component and ASP Technology,TP311.52
  9. Image Restoration Method Research and Its Application Based on Probability PCA,TP391.41
  10. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  11. Design and implementation of civil explosive industry online procurement system,TP311.52
  12. Design and Development of Accident Management Information System for Large-scale Hydropower Projects,TP311.52
  13. Research and Design of Virtual Research Center System of Yalong River Based on S2SH,TP311.52
  14. Research on the Low-cost RFID Systems Security Protocol,TP391.44
  15. Fujian Telecom operation and maintenance operations audit system design and implementation,TP311.52
  16. Research on Purpose-based Access Control in Relational Database,TP311.13
  17. Research on Checking and Digesting Policy Conflicts Under Multi-Policy Environments,TP393.08
  18. Design and Implementation of Network Access Control System Based on Portal Protocol,TP393.08
  19. VoIP Security Mechamism Research and Implementation Based on the Mobile Network,TN916.2
  20. Design and Implementation of Authentication Mechanism in Object-based Storage System,TP333

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile