A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology

碩士 === 國防管理學院 === 國防資訊研究所 === 93 === The reliance on the information system is growing day by day for the organization. The protection of information is also relatively important. However, everybody has the ability to be a hacker by the blooming Internet development. In addition of the information p...

Full description

Bibliographic Details
Main Authors: Ting Chun, 丁俊
Other Authors: Feng-Hao Liu
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/79340961123154209239
id ndltd-TW-093NDMC1654035
record_format oai_dc
spelling ndltd-TW-093NDMC16540352015-10-13T12:56:40Z http://ndltd.ncl.edu.tw/handle/79340961123154209239 A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology 軟體架構與軟體樣式之正規整合應用於網路安全機制之研究 Ting Chun 丁俊 碩士 國防管理學院 國防資訊研究所 93 The reliance on the information system is growing day by day for the organization. The protection of information is also relatively important. However, everybody has the ability to be a hacker by the blooming Internet development. In addition of the information protection tools to announce continuously, it forms an information security attack and defense war. The business must research and develop a appropriate security mechanism, as firewall and IDS(Intrusion Detection System) etc., for decreasing damage of the hacker intruding. Therefore, it is could effectively block the information insecurity events. But there are many problems taking place when the business built these network security mechanism. Such as the requirement of information security is not explicit, the characteristic of integral system construction is not able to be component, and the combination system element is not able to unify. Both the software structure and the software pattern are helpful to the software system design. The software structure is a viewpoint of the software engineering, and focuses on using the structure to develop large and complicated application system. Therefore, this research adopts the software structure and software pattern methodologies to solve the complicated design of the network security mechanism. It can detect the mistake in early time by analyzing the possibility of system characteristic in structure layer. Then we apply them to business network security mechanism design, in order to promote the compatibility of whole structure. There could be advantageous efficiency for the expression, the storage, the transmission, the share and reuse when integrating the software structure and software pattern, and it is able to develop the function of network security mechanism. Feng-Hao Liu 劉豐豪 2005 學位論文 ; thesis 100 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防管理學院 === 國防資訊研究所 === 93 === The reliance on the information system is growing day by day for the organization. The protection of information is also relatively important. However, everybody has the ability to be a hacker by the blooming Internet development. In addition of the information protection tools to announce continuously, it forms an information security attack and defense war. The business must research and develop a appropriate security mechanism, as firewall and IDS(Intrusion Detection System) etc., for decreasing damage of the hacker intruding. Therefore, it is could effectively block the information insecurity events. But there are many problems taking place when the business built these network security mechanism. Such as the requirement of information security is not explicit, the characteristic of integral system construction is not able to be component, and the combination system element is not able to unify. Both the software structure and the software pattern are helpful to the software system design. The software structure is a viewpoint of the software engineering, and focuses on using the structure to develop large and complicated application system. Therefore, this research adopts the software structure and software pattern methodologies to solve the complicated design of the network security mechanism. It can detect the mistake in early time by analyzing the possibility of system characteristic in structure layer. Then we apply them to business network security mechanism design, in order to promote the compatibility of whole structure. There could be advantageous efficiency for the expression, the storage, the transmission, the share and reuse when integrating the software structure and software pattern, and it is able to develop the function of network security mechanism.
author2 Feng-Hao Liu
author_facet Feng-Hao Liu
Ting Chun
丁俊
author Ting Chun
丁俊
spellingShingle Ting Chun
丁俊
A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology
author_sort Ting Chun
title A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology
title_short A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology
title_full A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology
title_fullStr A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology
title_full_unstemmed A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology
title_sort research for formal integration and application of software architecture and patterns used on network security technology
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/79340961123154209239
work_keys_str_mv AT tingchun aresearchforformalintegrationandapplicationofsoftwarearchitectureandpatternsusedonnetworksecuritytechnology
AT dīngjùn aresearchforformalintegrationandapplicationofsoftwarearchitectureandpatternsusedonnetworksecuritytechnology
AT tingchun ruǎntǐjiàgòuyǔruǎntǐyàngshìzhīzhèngguīzhěnghéyīngyòngyúwǎnglùānquánjīzhìzhīyánjiū
AT dīngjùn ruǎntǐjiàgòuyǔruǎntǐyàngshìzhīzhèngguīzhěnghéyīngyòngyúwǎnglùānquánjīzhìzhīyánjiū
AT tingchun researchforformalintegrationandapplicationofsoftwarearchitectureandpatternsusedonnetworksecuritytechnology
AT dīngjùn researchforformalintegrationandapplicationofsoftwarearchitectureandpatternsusedonnetworksecuritytechnology
_version_ 1717728362631266304