首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--一般性问题论文--安全保密论文

分布式文件系统的安全策略设计

摘要第4-5页
Abstract第5-6页
CHAPTER 1 INTRODUCTION第9-22页
    1.1 Research background第9-10页
        1.1.1 Distributed File System第9-10页
        1.1.2 The Security of Distributed File System第10页
    1.2 Research Status第10-20页
        1.2.1 Cloud Computing第10-11页
        1.2.2 Cloud Computing Distributed File System第11-14页
        1.2.3 Development of Structural Safety System第14-16页
        1.2.4 Distributed File System of Security Architecture第16-17页
        1.2.5 NFS第17-18页
        1.2.6 Coda第18页
        1.2.7 SFS第18-20页
    1.3 Research Methods to be Adopted第20页
    1.4 Research Content第20页
    1.5 Technical Route第20-22页
CHAPTER 2 THE KEY TECHNOLOGY OF DISTRIBUTED FILE SYSTEM SECURITY MECHANISMS第22-34页
    2.1 Security Need of Distributed File System第22-23页
    2.2 Distributed File System Security第23-34页
        2.2.1 User Authentication and Identification第23-30页
        2.2.2 Encryption Technology第30-34页
CHAPTER 3 RESEARCH ON SECURITY POLICY MODEL第34-41页
    3.1 The Role and Characteristics of the Security Model第34页
    3.2 The Typical Security Model Introduced第34-39页
        3.2.1 Bell‐Lampedusa Model第35-36页
        3.2.2 RBAC Model第36-37页
        3.2.3 Biba Model第37-39页
    3.3 Design Principles DPFS Security Module第39-41页
        3.3.1 Principle of Least Privilege第39页
        3.3.2 Scalability Principle第39页
        3.3.3 Integrity Principle第39-40页
        3.3.4 Based on "Allow" Principle第40页
        3.3.5 Privilege Principle of Separation第40页
        3.3.6 Easy to Use Principles第40-41页
CHAPTER 4 SECURITY FRAMEWORK DESIGN OF DISTRIBUTED PARALLEL FILE SYSTEM第41-51页
    4.1 Flask Operating System‐based Security第41-44页
        4.1.1 Flask Security Architecture第42-43页
        4.1.2 Selina Secure Operating System第43-44页
    4.2 Security Mechanisms and Goals第44-45页
        4.2.1 Security Mechanism第44-45页
        4.2.2 Goals第45页
    4.3 System to Achieve the Overall Logical Structure第45-49页
        4.3.1 DPFS Access Control Hook Set第46页
        4.3.2 Access Vector Cache (AVC)第46-47页
        4.3.3 Security Ruling Server (SS)第47页
        4.3.4 Security Policy Database Synchronization Module第47-48页
        4.3.5 Security Context Synchronization Module第48页
        4.3.6 Distributed Communication Encryption Module第48-49页
        4.3.7 Distributed Parallel User Management Module第49页
    4.4 Security Policy Design第49-51页
        4.4.1 RBAC Policy第49-50页
        4.4.2 DE Policy第50页
        4.4.3 File System Security Mark第50-51页
CHAPTER 5 DESIGN AND IMPLEMENTATION OF SAFETY MANAGEMENT第51-57页
    5.1 Design Ideas第51-52页
    5.2 Overall Design第52-53页
    5.3 Major Features第53-57页
        5.3.1 User Authentication第54-55页
        5.3.2 Competence Certificate第55页
        5.3.3 Rights Management第55-56页
        5.3.4 Security Management Interface第56-57页
CHAPTER 6 PERFORMANCE MEASUREMENT AND ANALYSIS第57-58页
    6.1 Test Environment第57页
    6.2 Test Analysis第57-58页
CHAPTER 7 CONCLUSION第58-60页
Acknowledgements第60-61页
References第61-63页

论文共63页,点击 下载论文
上一篇:二次创业的社会网络反哺机理研究
下一篇:云计算环境下基于模糊关键字的密文搜索研究