Dissertation > Excellent graduate degree dissertation topics show

The Research and Realization of the Architecture Design CAD Data Sharing Platform

Author: YuKe
Tutor: HuaDongPing
School: Donghua University
Course: Computer Software and Theory
Keywords: data sharing platform private data access control the cell granularity level user access control database security
CLC: TP391.72
Type: Master's thesis
Year: 2006
Downloads: 85
Quote: 0
Read: Download Dissertation


The rapid development of the Internet has already made the Web become an enormous information space. With the information-based degree in the enterprises becoming higher and higher, the application systems based on the Web has been used more and more widely in every fields. The development of the Web technology has been bringing in new research subjects and challenges.The enterprises want the business data among the different departments inside can be shared, and with the data sharing system users can access to the databases among the different application systems to share the data without changing the functions in the former systems, while the security of the access to the databases must be concerned. The user access control technology is the classical technology, which is used to improve the security of the database access, and has been widely used in a large number of application systems, gaining great success. But with the development of the application system, the traditional user access control need solving tow problems. The one is to realize the data access control at the cell granularity level, and the other is to make the user be the maker of the access policy. The paper starts with the analyzing the requirements of the databases system security, mainly analyzes and discusses the database system security mechanism and the content about the database privacy protection and points out the shortcomings in the traditional technology. The main jobs in thepaper can be embodied as follows:1. With the research results from the domestic and abroad, offers the private data access control middleware as a solution and supplies the application background, the relative concepts and the recent developing situations about the private data protection.2. The paper also describes the mainframe and the data model of the private data access control middleware in detailed and also put forward the implementation details and the working mechanism. The experiments and the analysis about the result data are mentioned to compare with the other solutions from the stability, efficiency and the complexity.3. The paper is based on the scientific research project - "The Research and Realization of the Architecture Design CAD Data Sharing Platform", detailed discusses the attributes of the platform, with the .NET and Web services technology, analyses, designs and implements the data sharing platform, puts forward the implementation of the three main modules, and offers the mainframe and the main use cases of the system and the interaction between the objects inside the system.4. The paper emphatically explains the combination and the basic application of the private data access control middleware and the data sharing platform, and points out the questions and solutions in the practical uses.At last, the article is on the basis of summarizing full paper, against the studied content, put forward some questions and look into the distance.

Related Dissertations

  1. Design and Implementation on an Improved Access Control for MySQL Database,TP311.13
  2. Research and Implementation of Database Firewall Based on Netfilter,TP393.08
  3. Research on Transfer Protocol and Penetration of ORACLE Database,TP311.13
  4. Security Audit Research on Data Center Data,TP311.13
  5. Design and Implementation of the site based on ASP technology is still fresh,TP393.092
  6. The Design and Development of Chinese Provincial Economic Data Web Services Platform,P208
  7. Database Web Service Behavior Analysis and Recognition Technology,TP311.13
  8. The Research and Implementation of Database Intrusion-Detection System Based on Association Rule Exploration,TP311.13
  9. Data Mining in Intrusion Detection System Research,TP393.08
  10. Kind of database mining method based on vulnerability,TP311.13
  11. The Foundation and Management of Data-base of Material and Child Hygiene,TP311.13
  12. Telecommunications Enterprises Back-end Database and the Server Program of Automatic Warning,TP311.13
  13. Research and Implementation of Web-based Nosocomial Infection Data-sharing Platform,TP311.52
  14. Research Andapplication of Database Security Audit Analysis,TP311.13
  15. The Research of Multi-path Routing Optimization Technology,TP393.08
  16. The Research and Application of Web Database Security Technology,TP311.13
  17. Research and Application of Security Audit Technology for Measuring System Database,TP311.13
  18. Database Intrusion Detection System Design and Implementation,TP393.08
  19. Research on Database Intrusion Detection Based on Associaton Rules,TP311.13
  20. The Research and Implementation of Spatial Environmental Data Sharing Platform,TP311.52
  21. Research and Implementation of Database Encryption System Model,TP309.7

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Information processing (information processing) > Machine-assisted technology > Machine -aided design (CAD), aided drawing
© 2012 www.DissertationTopic.Net  Mobile