Font Size: a A A

Research And Desgin Of The Access Control Model Based On QoP

Posted on:2016-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:T Y LuoFull Text:PDF
GTID:2298330467992562Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Against the background of the explosive development of the Internet, the network activity has become an essential part of daily life and production. For a long time, users always over-pursue the improvement on the quality of network service, especially, they merely focus on those directly experienced services such as comprehensive service classes, convenient operation, high-efficiency processing, etc. As a result, the user requirements usually fail to take security issues into account, and hence a reliable network featured by security can be hardly provided. To solve the above problems, recently some researchers brought the concept of Quality of Protection into our sight, for which the main idea aims at regarding security issues as a key element for research and analysis. Instead of the conventional thinking that considers each security threat separately, Quality of Protection adopts an integrated approach to analyze security issues of the system or network where users belong to, and thus leading to overall evaluation results. Within the concept, the security issues can move away from the theoretical analysis stage, and become a routine reference in daily network service just like QoS. In this paper, the main work is as follows:First of all, made research on the special algorithm of Quality of Protection evaluation.. Quality of Protection, as a completely new concept regarding network security area, mainly focuses on seeking a set of measurable and quantifiable indicators so as to effectively evaluate the security level of system; to provide security assurance for various users as well as businesses within different degrees; to meet the security needs of increasingly complex network environment. Considering the feature of the research problem which was non-quantification, in this paper, with AHP algorithm referred as the basic algorithm, and established an AHP-enhanced Quality of Protection evaluation model. Since the rapid development of the voice system in recent year, this paper took the SIP system as a case for analysis and has been clear about the evaluation model and the parameters of concrete.Secondly, made research and analyze the specific method of Quality of Protection and access control-combination. Access control is an important approach to achieve security management of network system, and Quality of Protection is the natural attribute of system which can be regard as the key element of system and comprehensively reflects the system security. The two have closely relationship. Therefore, to providing a more reliable protection means for users and Internet service, this paper combined the Quality of Protection and attribute-based access control model, put forward a access control model based on Quality of Protection, and gave the design scheme of security policy.Finally, in this paper, based on the above theoretical analysis, we set up a SIP system. Designed and implemented the access control based on the Quality of Protection model in the context of SIP system.
Keywords/Search Tags:internet security, access control, quality of protection, information security, SIP system
PDF Full Text Request
Related items