Dissertation > Excellent graduate degree dissertation topics show

Design and Implementation of Peripheral Subsystem in Intranet Security Access Control System

Author: YangBao
Tutor: WangZuo
School: Xi'an University of Electronic Science and Technology
Course: Computer System Architecture
Keywords: Intranet Security Peripheral Control Registry Filter Driver IRP
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 48
Quote: 0
Read: Download Dissertation

Abstract


With the development of information technology, many enterprises and corporations have their own Intranet, which makes information transmission more flexible and rapid and improves people’s work efficiency. However, the problem of information security of Intranet also emerges. Threats such as hacker, virus and troy horse from outer networks were widely concerned by public. However, according to the investigations of authoritative institutions, main security threats come from intranet and most information leakiness are caused by internal staff. In this background, an access control system of intranet is proposed in this paper, aiming to solve the problem of information security of intranet.The functions need to be implemented in the system and the outline design of the whole system are introduced. The system adopts C/S architecture, and the server monitors and configures the clients. According to the functions which the client needs to implement, the client is divided into five subsystems: communication and login subsystem, network access subsystem, file access subsystem, process access subsystem and peripheral access subsystem. Their outline designs are completed in this paper, respectively.Aiming at the threats from peripherals to the information security of Intranet, the access control subsystem of peripheral is designed and implemented. Firstly, existing techniques used in the access control of peripherals are analyzed. Then, the access control of common interface and peripheral and the file access control of storage device are implemented in this subsystem based on the registry control technique and filter driver technique. This subsystem efficiently restrains the behavior of information leakiness through peripheral, and thus insures the information security of Intranet.

Related Dissertations

  1. Research and Implementation on a Distributed Service Registry Based on HADOOP Platform,TP393.09
  2. Tile data recording disk drive technology research organization and its implementation,TP333.35
  3. Rootkit technology in the Third-Party Information Security System Research,TP309
  4. Platform for ATM host intrusion defense systems design and implementation,TP393.08
  5. Based on Windows platform Rootkit technology research and application,TP393.08
  6. Host within the network security management techniques and methods of,TP393.18
  7. Research on the Application of File System Filter Driver in Anti-malicious Code,TP393.08
  8. The Research of Centralized Access Control Technology for USB Storage Device Based on Trusted Kylin in LAN,TP393.1
  9. Technical Research on Offline Document Security with Information Flow Model,TP309.2
  10. The Design and Implementation of Fourth-Party Logistics Emergency Facility Management System Based on SOA,TP311.52
  11. Design and Implement of Storage Media Sensitive Information Protection System,TP333.35
  12. Establishment of the National Individual Monitoring Registry in China,R144
  13. Research and Implementation of Distributed Security Storage Network System,TP393.08
  14. Research and Implementation of Web Service Registry and Similarity Searching,TP393.09
  15. Design and Implementation of Safe Island in Data Security System,TP393.08
  16. Design and Implementation of Web Service - based electronic mall registry,TP311.52
  17. Registry and Application of Metadata in Science and Technology Resources Database,TP311.13
  18. Design and Implementation of Electornoic Forensics Sytem in Prosecution,TP399-C2
  19. Research on Security Management Strategy of USB Removable Storage Device,TP309
  20. Research on Windows Registry Forensic Analysis Technology,TP316.7
  21. Key Technologies of File Secret Classification Mark in Kernel-Level,TP309.7

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile