Font Size: a A A

Access Interface Layer Encryption System Based On The Windows Security Design And Implementation

Posted on:2012-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2218330368497633Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, personal computers become essential to daily life and work tools in a number of IBM-PC compatible operating system application, Microsoft Windows 2000/XP system with its outstanding user-friendly interface, a number of innovative features, intuitive operation and reliable design and the relative safety of rapidly becoming the most popular operating system platforms. However, it also made attacks on Microsoft Windows 2000/XP to become the largest platform of information leakage and tampering, hacking, virus dissemination, and other conditions often occur, the user's property, privacy, etc. pose a great threat, and sometimes may even irreparable damage, the operating system as a target for malicious attacks. With the Windows operating system becomes more widespread, people put a higher Windows security requirements. Windows security policy involves a wide range of complicated operations, including user accounts and user password, NTFS file system security, domain management, and user group permissions, start the log system to record the system's operation, share resources, access, lock the computer and so on. Windows operating system provides authentication and sign-on technology such as safe mode, faced with authentication mode of a single, relatively simple issues such as login way, far from being able to meet the people's higher level of security needs.Windows of this topic by some of the security subsystem to track the underlying mechanism of repeated experiments, made for different security policies (such as authorization, access control, etc.) the secondary development of solutions; by the current demand (see the subject source) Analysis of and on the possible needs of other markets in terms of general considerations, design a set of secondary development of security policies to meet the needs of the vast majority of the complete interface specification, and develop a set of Windows security policy can provide support for environmental reconstruction software system, while writing out the detailed technical documentation. By using this platform, developers can achieve development requirements simply select the security policy development of a template for submission algorithm module in accordance with standard package as well as resources module of the Windows security policies can be achieved by a second development of the desired result and so, developers will be can be more energy into the formulation of the strategy itself, rather than how to organically integrating with the operating system. Throughout the development process has become more convenient and faster.
Keywords/Search Tags:Windows Operating System, Security Policy, Authentication Mode, Encryption System
PDF Full Text Request
Related items