A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology
碩士 === 國防管理學院 === 國防資訊研究所 === 93 === The reliance on the information system is growing day by day for the organization. The protection of information is also relatively important. However, everybody has the ability to be a hacker by the blooming Internet development. In addition of the information p...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/79340961123154209239 |
id |
ndltd-TW-093NDMC1654035 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093NDMC16540352015-10-13T12:56:40Z http://ndltd.ncl.edu.tw/handle/79340961123154209239 A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology 軟體架構與軟體樣式之正規整合應用於網路安全機制之研究 Ting Chun 丁俊 碩士 國防管理學院 國防資訊研究所 93 The reliance on the information system is growing day by day for the organization. The protection of information is also relatively important. However, everybody has the ability to be a hacker by the blooming Internet development. In addition of the information protection tools to announce continuously, it forms an information security attack and defense war. The business must research and develop a appropriate security mechanism, as firewall and IDS(Intrusion Detection System) etc., for decreasing damage of the hacker intruding. Therefore, it is could effectively block the information insecurity events. But there are many problems taking place when the business built these network security mechanism. Such as the requirement of information security is not explicit, the characteristic of integral system construction is not able to be component, and the combination system element is not able to unify. Both the software structure and the software pattern are helpful to the software system design. The software structure is a viewpoint of the software engineering, and focuses on using the structure to develop large and complicated application system. Therefore, this research adopts the software structure and software pattern methodologies to solve the complicated design of the network security mechanism. It can detect the mistake in early time by analyzing the possibility of system characteristic in structure layer. Then we apply them to business network security mechanism design, in order to promote the compatibility of whole structure. There could be advantageous efficiency for the expression, the storage, the transmission, the share and reuse when integrating the software structure and software pattern, and it is able to develop the function of network security mechanism. Feng-Hao Liu 劉豐豪 2005 學位論文 ; thesis 100 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防管理學院 === 國防資訊研究所 === 93 === The reliance on the information system is growing day by day for the organization. The protection of information is also relatively important. However, everybody has the ability to be a hacker by the blooming Internet development. In addition of the information protection tools to announce continuously, it forms an information security attack and defense war. The business must research and develop a appropriate security mechanism, as firewall and IDS(Intrusion Detection System) etc., for decreasing damage of the hacker intruding. Therefore, it is could effectively block the information insecurity events. But there are many problems taking place when the business built these network security mechanism. Such as the requirement of information security is not explicit, the characteristic of integral system construction is not able to be component, and the combination system element is not able to unify.
Both the software structure and the software pattern are helpful to the software system design. The software structure is a viewpoint of the software engineering, and focuses on using the structure to develop large and complicated application system. Therefore, this research adopts the software structure and software pattern methodologies to solve the complicated design of the network security mechanism. It can detect the mistake in early time by analyzing the possibility of system characteristic in structure layer. Then we apply them to business network security mechanism design, in order to promote the compatibility of whole structure. There could be advantageous efficiency for the expression, the storage, the transmission, the share and reuse when integrating the software structure and software pattern, and it is able to develop the function of network security mechanism.
|
author2 |
Feng-Hao Liu |
author_facet |
Feng-Hao Liu Ting Chun 丁俊 |
author |
Ting Chun 丁俊 |
spellingShingle |
Ting Chun 丁俊 A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology |
author_sort |
Ting Chun |
title |
A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology |
title_short |
A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology |
title_full |
A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology |
title_fullStr |
A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology |
title_full_unstemmed |
A Research for Formal Integration and Application of Software Architecture and Patterns used on Network Security Technology |
title_sort |
research for formal integration and application of software architecture and patterns used on network security technology |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/79340961123154209239 |
work_keys_str_mv |
AT tingchun aresearchforformalintegrationandapplicationofsoftwarearchitectureandpatternsusedonnetworksecuritytechnology AT dīngjùn aresearchforformalintegrationandapplicationofsoftwarearchitectureandpatternsusedonnetworksecuritytechnology AT tingchun ruǎntǐjiàgòuyǔruǎntǐyàngshìzhīzhèngguīzhěnghéyīngyòngyúwǎnglùānquánjīzhìzhīyánjiū AT dīngjùn ruǎntǐjiàgòuyǔruǎntǐyàngshìzhīzhèngguīzhěnghéyīngyòngyúwǎnglùānquánjīzhìzhīyánjiū AT tingchun researchforformalintegrationandapplicationofsoftwarearchitectureandpatternsusedonnetworksecuritytechnology AT dīngjùn researchforformalintegrationandapplicationofsoftwarearchitectureandpatternsusedonnetworksecuritytechnology |
_version_ |
1717728362631266304 |