Dissertation > Excellent graduate degree dissertation topics show

Design and Implementation of User Authorization Management and Access Control Technology in Network Management System

Author: YuLei
Tutor: JiangJianGuo;LiJiWen
School: Xi'an University of Electronic Science and Technology
Course: Software Engineering
Keywords: access control Identity Authentication Authorization Management Java Authentication and Authorization Service(JAAS)
CLC: TP393.08
Type: Master's thesis
Year: 2006
Downloads: 58
Quote: 2
Read: Download Dissertation


Network resource can be shared expediently through computer network,however the shared resource and information security are a pair of contradiction.As the more resources are enhanced to be shared with,the more security questions gone with stand out increasingly.presently,safe technology contain Cryptography ,Access Control, Authentication,Intrusion Dection, Risk Analysis and protection and so on. Identity Authentication, Authorization Management and Access Control are the both very import sides in the network application security.wherefore they become the research hotspot ininformation security field.This paper researches the user authorization and access control technology. Firstly,the dissertation narrates the development and present state of user administration and correlative techniques, focus on the role-based access control. This paper also research the Public Key Infrastructure (PKI) and Privilege Management Infrastructure (PMI) ,then build the PKI/PMI unite authenticatin system.The role-based access control technology is adopted in this paper.After that we particularly introduce the infrastructure of JAAS, the components of it and the API’s (the classes and the interfaces) functions. Our system is built on the basis of JAAS, we design the user,roles and authorization ,particularly design the landing module and authorization management module,then testing the result. This paper implement the application of user authorization and access control technology in the UEMC system.

Related Dissertations

  1. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  2. The Design and Implementation of DICOM Middle Software and Access Control Model in Formation Integration Platform,TP311.13
  3. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  4. Study on the Access Control of the Court Information System,TP309
  5. The Design and Implementation of Higher People’s Court Website That Based on Component and ASP Technology,TP311.52
  6. Design and implementation of civil explosive industry online procurement system,TP311.52
  7. Research and Design of Virtual Research Center System of Yalong River Based on S2SH,TP311.52
  8. Fujian Telecom operation and maintenance operations audit system design and implementation,TP311.52
  9. Research on Purpose-based Access Control in Relational Database,TP311.13
  10. Research on Checking and Digesting Policy Conflicts Under Multi-Policy Environments,TP393.08
  11. Research and Implementation of Embeded Web System Security,TP393.08
  12. Design and Implementation of Network Access Control System Based on Portal Protocol,TP393.08
  13. The Authorization Management System of the River Dike’s Management Information System Based on RBAC,TV871
  14. Design and Realization of Distributed RFID Access Control System,TP273.5
  15. Research and Implementation on Smartcard Database Management System,TP311.52
  16. Design and Implement of Frequency EOC System and Research of Its Security Mechanism,TN915.02
  17. The Research of Hubei Medical Card Mode and Information Platform,R197.1
  18. Identity-Based Authentication System Research and Implementation,TN918.1
  19. Converged IP and FC storage system security architecture design and implementation,TP333
  20. Distributed Storage System Security Key Technology Research and Implementation,TP333
  21. Virtual domain access control system protection mechanisms,TP309.2

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile