Font Size: a A A

The Research On Security Model Of Ship-Product Data Management

Posted on:2005-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:X K GuoFull Text:PDF
GTID:2132360125970918Subject:Ships and marine structures, design of manufacturing
Abstract/Summary:PDF Full Text Request
The contents of this paper mainly focus on the security of the product data management, and by utilizing the model theory, this paper has exhaustively analyzed the theory which is used by the current PDM system, striving to find out a more effective way, so as to ensure the integrity, uniformity and confidentiality of the product data.By referring to the experience of fully-developed products which were developed by international or national companies, and by combining the model theory, this paper has analyzed the measures and ways which have applied to current products, providing a fundamental structure of security model; basing on this foundation, this paper demonstrates the way of implementation of PDM security subsystem, including the model of access control, user identification management, user authentication management, data backup and recovery, the I/O of product data, system log management; Also considering that there is need to develop and upgrade the technical means of security, the subsystem adopts the thought of dynamic upgrading, so as to enhance the security of the system. In the process of analyzing the typical case of data management security, this paper also presents some new way to ameliorate the security model, i.e. taking user's operation and data-stream as basic activity case.As the products of ship industry have their own feature-especially have the feature of modern PDM, this paper attempts to design it specifically, in the process of implementing this subsystem; so as to ensure that it be easier to integrate PDM2001 system.Basing on the security model, this paper has built up a subsystem of data management security, and presented a better conclusion of security subsystem onsecurity model.
Keywords/Search Tags:Security model, Data management, RBAC
PDF Full Text Request
Related items