跳到主要內容

臺灣博碩士論文加值系統

(44.200.122.214) 您好!臺灣時間:2024/10/12 23:20
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:黃韋峰
研究生(外文):Wei-feng Huang
論文名稱:對於cadabia資料庫的認證系統
論文名稱(外文):Authentication System for Cadabia Database
指導教授:貝若爾
指導教授(外文):Daniel J. Buehrer
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:40
中文關鍵詞:認證系統資料庫
外文關鍵詞:authenticationcadabia
相關次數:
  • 被引用被引用:0
  • 點閱點閱:262
  • 評分評分:
  • 下載下載:10
  • 收藏至我的研究室書目清單書目收藏:0
我們為Cadabia 資料庫設計一個驗証系統。 而這個資料庫是及時,多工,分散,且是一個物件導向的資料庫在網際網路上。 我們的系統為驗証使用CA(中心的權力)。 在這篇論文裡,我們介紹系統體系架構,驗証程式和系統實施
We describe an authentication system for the Cadabia database. The database is a real-time, multi-threaded, distributed, and object-oriented database on the World-Wide-Web. Our system uses a CA (central authority) for authentication. In this thesis, we introduce the system architecture, authentication procedure, and system implementation.
CHAPTER 1 Introduction
1.1 Overview …………………………………………………………………….1
1.2 Cadabia Database System …………………………………..……………….1
1.3 Goals of Our Authentication System ……………………….……………….1

Chapter 2 The Cadabia Database System
2.1 Three-Tier Architecture ………………………………………….…………….3
2.2 Ontology ………………………………………….……………………...…….4
2.3 IS-A relationships ………………………………………….……….………….5
2.4 Distributed Databases ………………………………………………………….7
2.5 Ideal of Authentication System. ………………………………….…………….7

Chapter 3 Authentication System Design
3.1 Introduction Java SSL ……………………………….………………………...9
3.2 System Description ………………………………….………………………...11
3.2.1 User Logs in Cadabia Server and Cadabia Server Recognizes the User’s Identification ………………………………….…………………………….….12
3.2.2 User use of Cadabia database ………………………………….…………13
3.3 Authentication System and Cadabia Three-Tier Architecture ……..………….14
3.3.1 Central Authority with Middle Layer and Backend Layer...................14
3.3.2 Central Authority with the Middle Layer and Backend Layer……….17

3.4 System Feature …………………………………………………………..…..18
3.4.1 Session Key ……………………...…………………………………….18
3.4.2 Protection Information ……………...…………………………………18

Chapter 4 Implementation
4.1 Message format ……………………….…………………………….………...21
4.2 Application Program Interface ……………………….…………………….…25
4.3 Data Structure and Passive Methods ……………………….…………..….…27

Chapter5 Conclusions and Future Work
5.1 Conclusions …………………………………………………………………..31
5.2 Future work …..................................................................................................31

Reference …………....................................................................................................32
[1] Ontology Works Incorporated
http://ontologyworks.com/what_is_ontology.php

[2] IEEE Standard Upper Ontology Working Group
http://suo.ieee.org/

[3] Chen Ching-Hua “A Semantic Web Editor”, A thesis submitted to Institute of Computer Science and Information Engineering College of Engineering, National Chun Chen University, Taiwan, June, 2004.

[4] D. J. Buehrer, Lo Tse-Wen, Hsieh Chih-Ming “Abia Cadabia : A Distributed Intelligent Database Architecture”, Intelligent Multimedia, Computing, and Communications, (Mahbubur Syed and Orlando Baioochi, Eds.), John Wiley and Son, New York, 2001.

[5] Su Microsystems Inc. Java Software Homepage
http://java.sun.com

[6] Wang Chun-Yao “An Implementation of a Class Algebra Security Server”, a Thesis Presented to the Institute of Computer Science and Information Engineering National Chung Cheng University Chia-Yi, In Partial Fulfillment of the Requirement of the Degree Master, Taiwan, June 2003.

[7] Chang Shuen-Chia “A Database Middle Layer for the World-Wide Web”, A thesis Submitted to the Institute of Computer Science and Information Engineering National Chung Cheng University Chia-Yi, Taiwan, In Partial Fulfillment of the Requirement of the Degree Master, July 2005.

[8] Tseng Huang-Jye “Database XML/SQL Backends for the World Wide Web”, A thesis Submitted to the Institute of Computer Science and Information Engineering National Chung Cheng University Chia-Yi, In Partial Fulfillment of the Requirement of the Degree Master, Taiwan, July 2005.



[9] Wu Tzai-Hung “A Database Front End for the World-Wide Web” A thesis Submitted to the Institute of Computer Science and Information Engineering National Chung Cheng University Chia-Yi, In Partial Fulfillment of the Requirement of the Degree Master, Taiwan, July 2005.

[10] Buehrer and Chee-Hwa Lee, "Class Algebra for Ontology Reasoning", Proc. of TOOLS Asia 99 (Technology of Object-Oriented Languages and Systems, 31st International Conference), IEEE Press, Nanjing, China, Sept. 22-25, pp.2-13

[11] D. J Buehrer, “Organizing Multimedia Objects Using a Class Algebra Database”, Distributed Multimedia Database: Techniques and Applications, Timothy k, Shih (ed.), Idea Group Publishing, Hershey, Pennsylvania, Chapter 20, 2001.

[12] Java Remote Method Invocation
http://java.sun.com/products /jdk/rmi/index.html

[13] Hung-Chia Chen “An Implement of a Secure Method Invoker in a Distributed OODB” A thesis Submitted to the Institute of Computer Science and Information Engineering National Chung Cheng University Chia-Yi, In Partial Fulfillment of the Requirement of the Degree Master, Taiwan, July 2000.

[14] the Kerbos-like authentication systems
http://docs.sun.com/app/docs/doc/816-5164/6mbavnoob?l=zh_TW&a=view
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文