Dissertation > Excellent graduate degree dissertation topics show
The Research of Security Problem Based on Manufacturing Gird
Author: ShuDan
Tutor: XinSiJin
School: Wuhan University of Technology
Course: Communication and Information System
Keywords: manufacturing grid security system structure authentication authorization
CLC: TP393.08
Type: Master's thesis
Year: 2006
Downloads: 98
Quote: 1
Read: Download Dissertation
Abstract
Along with the popularization and enhancement ot computer application, the application demand of human-being is rapidly facing high performance, multiplicity and multi-purpose development, specially the ability of solving the computer question. Thus the computation algorithm is becoming more and more complex, the computation scale is becoming huger and huger, and the ability for computer to bear big load and the computation speed also requires more and more highly. The appearance of grid has provided the practical and feasible solution for this difficult problem, and has been paid more and more attention by experts in correlative domains.As the foundation of grid, security problem is more complex than general security problem, moreover the real-time performance and the long life cycle which it is under manufacturing grid environment, caused the research of security topic more difficultly. This topic has first studied the last domestic and foreign grid security as well as the present development situation and direction of manufacturing grid, has thoroughly studied the security method which existing in present grid technology;Then it did the thorough research of the GSI under Globus environment, discussed the course of mission submitting implementation and the construction characteristic, and analyzed some deficiency of GSI in the existing situation;After studying the difference between the grid under the manufacturing environment and the ordinary grid, the demand of grid security under the manufacturing environment was analyzed;Above this foundation, the topic has made the correlation improvement based on the existing GSI construction, and constructed a security system structure M-GSI to satisfy partial characteristic under the manufacture grid, including the design of the CA (Certificate Authority) subsystem, the Certificate Verify Server subsystem and the Distributed Authorization Center subsystem, and thoroughly researched the design thought and the security policy of the subsystems, the new manufacturing grid security system structure have realized the functions of real-time authentication and the strong authorization, has satisfied the partial security requirements of manufacturing grid.
|
Related Dissertations
- Research on Transparent Security of JPEG Image,TP391.41
- The Design of Computer Forensics Model Based on Windows Log,D918.2
- Study on Legal Issues in Concluding Electronic Commerce Contract,D923
- Digital library information resources development and utilization of collective management of copyright,D923.41
- Image Restoration Method Research and Its Application Based on Probability PCA,TP391.41
- Research of Security Application in Enterprise Based on PKI Technology,TP393.08
- Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
- Research on Provably Security Model for AKE Protocol,TP309
- An Identity Certification System for the Online Banking Based on Fingerprint Recognition and PKI,TP393.09
- Research password authentication key agreement protocol based,TN918.1
- Design and Implementation of Zhaoqing S & T Polytechnic Online Examination System Base on Computer Basis,TP311.52
- Research and Implementation for Single Sign on System Based on PKI,TP393.08
- Distributed Ad Hoc network part of key management and authentication scheme,TN929.5
- The Design and Implementation of APs and Stations’ Management Based on Centralized WLAN Architecture,TN925.93
- Distributed Authenticated Skip List and Its Application in P2P Distributed Storage System,TP333
- Guard Against Phishing Attacks for Two-way User Authentication Mechanisms and Implementation,TP393.08
- The Judicial Authentication Institutions Management System to Reform and Perfect in Our Country,D918.9
- Based on the RADIUS protocol analysis and application of the extended attribute,TN915.04
- Distributed authentication technology research,TN929.5
- Authentication in e-government application of,TP393.08
- Windows-based interface layer encryption Secure Access System Design and Implementation,TP393.08
CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net Mobile
|