Dissertation > Excellent graduate degree dissertation topics show

Research of Active Access Control to Near Space Information Resources Based on Subject’s Preference Knowledge

Author: LiuDeSheng
Tutor: FengXiaoSheng
School: National University of Defense Science and Technology
Course: Management Science and Engineering
Keywords: Near space information resources Access Control Active Control Preference knowledge Noumenon
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 89
Quote: 0
Read: Download Dissertation


With the near space in this area is gradually drawn worldwide concern and become the recent research focus , accompanied by the rapid development of China 's space technology and information technology , aerospace equipment system of continuous improvement will allow increasingly rich information resources of the near space , the importance of the control of access to the information resources of the near space gradually exposed. However, the current study of near space information resources at an early stage , a safe and efficient access control policy for the use of information resources to provide security need to be made ??based on the characteristics of information resources . This paper first analyzes the concept of near space information resources and the organizational form of the future applications , a clear demand for the implementation of the access control of information resources . Through traditional discretionary access control (DAC), the analysis based on the task access control (TBAC) correlation model defects subject preference knowledge - based active access control strategy ( SPAC ) . Relative to traditional access control models consider only the authorized user access this article by introducing access control concept of continuity , user history preference knowledge granularity in real-time active control of access operation . Policy model in the design process , combined with the information resources of the near space multi -level hierarchical organizational characteristics on the model defines modules as well as control flow . Set theory formal description of the basic elements of the model , relational mapping , and constraint rules . In the technical solution in the design process , the analysis of a single isolated environment access control framework design , and extended to the overall framework for access control in the multi - level joint application environment , the levels preference reasoning service component frame member and running processes were studied . Discussion and the use of technology , including LDAP, body , Jena , the detailed design of the organizational structure of multi-level user security information , preferences, knowledge base and preference knowledge reasoning . Use case diagram , activity diagram , and the timing diagram , the definition of the prototype system to be achieved , running processes portrayal model application example to achieve using UML unified modeling tools based on the J2EE platform to complete a prototype system and initial use .

Related Dissertations

  1. Parametric Approach of Active Control Technology for Tailless Flying-Wing Aircraft,V249.1
  2. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  3. The Design and Implementation of DICOM Middle Software and Access Control Model in Formation Integration Platform,TP311.13
  4. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  5. Study on the Access Control of the Court Information System,TP309
  6. The Design and Implementation of Higher People’s Court Website That Based on Component and ASP Technology,TP311.52
  7. Applied Research of Ontology in Intelligent Residence Community,TP391.1
  8. Design and implementation of civil explosive industry online procurement system,TP311.52
  9. Research and Design of Virtual Research Center System of Yalong River Based on S2SH,TP311.52
  10. Fujian Telecom operation and maintenance operations audit system design and implementation,TP311.52
  11. Research on Purpose-based Access Control in Relational Database,TP311.13
  12. Research on Checking and Digesting Policy Conflicts Under Multi-Policy Environments,TP393.08
  13. Research and Implementation of Embeded Web System Security,TP393.08
  14. Design and Implementation of Network Access Control System Based on Portal Protocol,TP393.08
  15. Design and Realization of Distributed RFID Access Control System,TP273.5
  16. Research and Implementation on Smartcard Database Management System,TP311.52
  17. Design and Implement of Frequency EOC System and Research of Its Security Mechanism,TN915.02
  18. Research on Semantic-based Inspection of Construction Engineering Quality,TP391.1
  19. Semi-active Control of Seismic Response of Benchmark Model Based on Smart Piezoelectric Friction Damper,TU352.12
  20. Identity-Based Authentication System Research and Implementation,TN918.1
  21. Converged IP and FC storage system security architecture design and implementation,TP333

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile