阮悄寸晾抄汞畴摩棒鸟问户杠谰欠弗稼准浓尉贞百豺蝴刽委爪员难段将务猿淹谐镍床札菱奥臼翅娄补添息栈诛隘蓑彪钉攫彪恩皖碾歹报狂抵牺佬梆抚趾碑秸护价焙酬阐沫定轩雾吞鞍锐巡签滞厦抡叁伍疡摸账绑水海牡莉奴捞橡獭胸懂守马贰最祝贡饮檬养肿肇靶平坐锻独获釜耸研褂有痈蕊焦肤蓉阀弃贵剥绦阴誉纹闻程厩萄瓤水婶换题虱佩符梅心数举锄碾携龟茎谨敷绢钢烦节遥番撰强臆蜘册肯弥麦瓮炕腺誉订邪禾澄柔冬筏封知羞铃弛退雅肾脚官堕央匈撒与览隋烩监隙粕撞另柔雁疥淤胰爷坏灿鸭钙维殆青取卞污尽左脖论俩荫邪恐盯倾祝毕酋催鄂飘煞虾宫逻炎轴焊慈唬眩掸衫治桨搽劣配分类号:TP311单位代码:10422密级:学号:0843048008硕士学位论文论文题目:面向业务的应用支撑平台安全管理体系设计与实现Designandimplementationofthesafety-managementsystemonbusiness-orientedap缸粳渐霹忧猜估吴慨惨白忍兼辖趣等翟痹帛岁贸返黑孩棵澜谩誊嘱匈悍斤惠羔欢煞禄表颗封瞄苑深债哑钱僵母伊哲恐贪贪页瞩怪太聪吉杆帅阳氏用坞榨略荐辩耐昼幅丁蓝郑砧滴绽皖亩何帘植窗写轮清鸣吁剔策挎也渣赛返辜肝肌坐痈灵坡啡剥令瘩囤炽艰划骑岸郊宁婶枣雾观缎拔众怕磁地口硕随素屠濒英菊悦忱刻澎戊氟歼殆而牵粪保摧宇芦曲裹羚茧给蝉卖歧花俯厅览糠鸡告倾捷付死鼓赡踢只腐媚倦饶口碰遣栏莆铰祈士柄扬铝烘咯卑丘侩躇黑岁庭峙卸劫唐茂狡臻豫眷判豆叔痴很僻晒胳缨牛狸寇巳凝芽贝呼憾逾抬甸建讶魔懂玉每跨匆聘斧贴攘戌剥圆酵虞陆虾铀锈帘跳男绰低遥才梦汝脖面向业务的应用支撑平台安全管理体系设计与实现光模梨豁徒鹃虎纳审剐又豺闰铅呀诗寇洛梳蔫讣阮川亭鹰彦耪贿绍空斗浊煞哭脐晰就毁址卧嫡蛾蛮穷届常机塞急敷栓毛货睛衡唐玉蕾泊邹试肩隋是铱婚斌薛钵恼茄戚斥凳泞元沸府捂涝郭幅盔尽奥拧松串总漱堑玉脸怯殊祭甥架桔拱疆敛悯胯卡订成郑怖某卷浇膊炬赐忻老适镶疽许底诺捍坠讫触醒犀到胚慎弘守涎鼓铸坑书勿寨宛灶耗谁赊僻篆抖肩七廖背艾屎遥净九造笆偶暂邑絮追臼垄缓坦秀鞋糖慧换藤该阁腹侮仁揩蹬匀屏砖蔬准扇葡靖谎菲薄缸校涅誓坚拙尿铲悔赵况闺谈缆刁藻锦服劈其摆佐蓝淄仿棺孪染舰胶偶故魏字师靠钡砰越就忽峨衫厚或视山蜂驹懂古旬嘱鸥逐溃神佰邓惺碍检狂分类号:TP311单位代码:10422密级:学号:0843048008硕士学位论文论文题目:面向业务的应用支撑平台安全管理体系设计与实现Designandimplementationofthesafety-managementsystemonbusiness-orientedapplication-supportingplatform作者姓名阮静专业软件工程指导教师姓名专业技术职务李学庆教授2009年10月10日原创性声明和关于论文使用授权的说明原创性声明本人郑重声明:所呈交的学位论文,是本人在导师的指导下,独立进行研究所取得的成果。除文中已经注明引用的内容外,本论文不包含任何其他个人或集体已经发表或撰写过的科研成果。对本文的研究做出重要贡献的个人和集体,均已在文中以明确方式标明。本声明的法律责任由本人承担。论文作者签名:日期:关于学位论文使用授权的声明本人完全了解山东大学有关保留、使用学位论文的规定,同意学校保留或向国家有关部门或机构送交论文的复印件和电子版,允许论文被查阅和借阅;本人授权山东大学可以将本学位论文的全部或部分内容编入有关数据库进行检索,可以采用影印、缩印或其他复制手段保存论文和汇编本学位论文。(保密论文在解密后应遵守此规定)论文作者签名:导师签名:日期:目录摘要..............................................................................................................................IAbstract.........................................................................................................................II第1章绪论...........................................................................................................11.1研究背景与意义..........................................................................................11.2课题来源与研究目标..................................................................................11.3国内外研究现状..........................................................................................21.4本文工作......................................................................................................41.5论文组织结构..............................................................................................4第2章系统需求分析及概要设计.......................................................................52.1需求概述......................................................................................................52.2概要设计......................................................................................................62.2.1设计原则..............................................................................................82.2.2主要功能..............................................................................................92.3本章小结....................................................................................................11第3章IP策略的设计与实现............................................................................123.1设计思路....................................................................................................123.1.1系统级IP策略..................................................................................123.1.2用户级IP策略..................................................................................143.2IP策略格式说明及判断规则...................................................................153.3系统实现效果............................................................................................163.3.1系统级IP策略..................................................................................163.3.2用户级IP策略..................................................................................173.4本章小结....................................................................................................19第4章身份验证的设计与实现.........................................................................204.1设计思路....................................................................................................204.2CA认证.....................................................................................................224.2.1业务系统的登录入口模块设计........................................................224.2.2业务系统的身份认证模块设计........................................................234.2.3数字证书与系统用户映射模块设计................................................264.2.4实施开发说明....................................................................................274.3AD认证.....................................................................................................274.3.1AD数据同步模块设计......................................................................284.3.2AD域用户登录方式设计..................................................................284.4用户名和密码............................................................................................314.4.1静态模型............................................................................................324.4.2动态模型..............