首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机软件论文--程序设计、软件工程论文--软件工程论文

A Security Subsystem Based on Clark & Wilson Model (SSBbcwm Implemented on Payroll Management System & Heritage Management System)

INDEX第2-4页
LIST OF FIGURES第4-6页
ABSTRACT第6页
CHAPTERS第9-69页
    1 NTRODUCTION第9-15页
        1.1 INTRODUCTION第9-10页
        1.2 DESCRIPTION OF THE PROBLEM第10-11页
        1.3 OVERVIEW OF THE MODELS OF SECURITY第11-12页
        1.4 OVERVIEW OF THE (SSBCWM)第12-14页
        1.5 OVERVIEW OF THE CHAPTERS第14-15页
    2 THREE-TIER APPLICATION DEVELOPMENTS第15-27页
        2.1 THE ADVANTAGES OF3-TIER ARCHITECTURE第15-16页
        2.2 THREE-TIER STRUCTURE, COMPONENTS, AND ARCHITECTURE第16-17页
        2.3 LOGICAL THREE-TIER MODEL第17-22页
            2.3.1 PHYSICAL TWO-TIER IMPLEMENTATION WITH FAT CLIENTS第18-19页
            2.3.2 PHYSICAL TWO-TIER IMPLEMENTATION WITH A FAT SERVER第19页
            2.3.3 PHYSICAL THREE-TIER IMPLEMENTATION第19-21页
            2.3.4 INTERNET IMPLEMENTATION第21-22页
        2.4 CHOOSING AN IMPLEMENTATION第22-23页
        2.5 FORMS SERVER第23-27页
            2.5.1 FORMS SERVER ARCHITECTURE第23-24页
            2.5.2 FORMS SERVER COMPONENTS第24-25页
                2.5.2.1 FORMS APPLET第24-25页
                2.5.2.2 FORMS LISTENER第25页
                2.5.2.3 FORMS RUNTIME ENGINE第25页
            2.5.3 FORMS SERVER IN ACTION第25-27页
    3 SECURING THREE-TIER SYSTEMS第27-32页
        3.1 SECURITY CHALLENGES IN THREE- TIER第27-29页
            3.1.1 USER AUTHENTICATION第27页
            3.1.2 USER ACCESS CONTROL第27-28页
            3.1.3 PROTECTING USER DATA第28页
            3.1.4 TRACKING USER ACTIVITY第28页
            3.1.5 LIMITING MIDDLE TIER PRIVILEGE第28页
            3.1.6 MANAGING IDENTITIES AND ACCOUNTS ACROSS TIERS第28页
            3.1.7 SCALING TO THE INTERNET第28-29页
        3.2 ORACLE8I SECURITY SOLUTIONS第29-32页
            3.2.1 OC L CLIENT AUTHENTICATES TO MIDDLE TIER第29页
            3.2.2 SSL第29页
            3.2.3 VIRTUAL PRIVATE DATABASE第29-30页
            3.2.4 DIRECTORY INTEGRATION第30-31页
            3.2.5 SCHEMA LESS USERS第31页
            3.2.6 SECURE APPLICATION ROLES第31页
            3.2.7 AUDIT ENHANCEMENTS第31-32页
    4 IMPLEMENTATION OF (SSBCWM)第32-52页
        4.1 IMPLEMENTATION OF CLERK-WILSON MODEL第32-39页
            4.1.1 TRIGGERS第34-39页
        4.2 THE PAYROLL MANAGEMENT SYSTEM第39-47页
        4.3 THE HERITAGE MANAGEMENT SYSTEM第47-52页
    5 A WALK THROUGH THE SYSTEM第52-67页
        5.1 ACCESSING THE PAYROLL MANAGEMENT SYSTEM第52-59页
        5.2 ACCESSING THE HERITAGE MANAGEMENT SYSTEM第59-62页
        5.3 USERS' PRIVILEGES第62-64页
        5.4 PASSWORD PROTECTION第64-65页
        5.5 PHYSICAL STORAGE第65-67页
    6 ONCLUSIONS第67-69页
        6.1 SUMMARY AND CONCLUSION第67-69页
REFERENCES第69-72页
BIOGRAPHICAL SKETCH第72-73页
APPENDIX第73-86页
    A- PAYROLL DATABASE CODE第73-81页
    B- HERITAGE DATABASE CODE第81-86页
ACKNOWLEDGMENTS第86页

论文共86页,点击 下载论文
上一篇:昆虫病原真菌绿僵菌二糖水解酶研究
下一篇:分布式虚拟专用网关键技术的研究——Internet密钥交换模块的设计与实现