12.01.2015 Views

Download - Academy Publisher

Download - Academy Publisher

Download - Academy Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Enterprise Portal security provides a graphics-based<br />

administrative interface, relies on standards-based<br />

security mechanisms, and provides interoperability with<br />

existing Internet and enterprise security infrastructures<br />

such as secure socket layers (SSLs) and public-key<br />

infrastructures (PKIs) [2].<br />

B. Enterprise Portal security architecture<br />

Enterprise Portal security services include these<br />

elements:<br />

• A security servlet on the Web server<br />

• Enterprise Portal Application Server components<br />

• The connection manager<br />

• The object manager<br />

• The SBO<br />

• The Access Control Database (the security<br />

repository)<br />

The Portal Security Officer manages Enterprise Portal<br />

security using the Enterprise Portal Security Manager, a<br />

graphics-based administration tool. The security<br />

architecture provides a uniform structure for user<br />

authentication and authorization for the entire Enterprise<br />

Portal—including both Sybase and non-Sybase<br />

applications and components.<br />

VII. LOGCISQL-BASED ARCHIVE AND SEARCH SYSTEM<br />

LogicSQL [8] is independently developed based on the<br />

Linux high-level security database system [3]. Ministry<br />

of Science and Technology "863" Database Group of the<br />

major projects comments LogicSQL database "It is the<br />

only hope that China’s database products will be able to<br />

contend with America’s mainstream database products in<br />

the next few years."<br />

The core functions of the system as follows: Archiving<br />

that replaces the traditional backup functions is<br />

completed in the system; Information on the enterprise<br />

server and personal computers are protected and managed;<br />

The latest search technology is used to realize the rapid<br />

and accurate searching for the backup information,<br />

including keyword, semantics, the integrated use of<br />

intelligent search technology; Search results are<br />

consistent with the security level of users.<br />

Information crawl tools<br />

Automatic document<br />

Classification and Chinese<br />

Segmentation tools<br />

Index tools<br />

User Query web interface<br />

Database Access<br />

Control Interface<br />

Audit tools<br />

Arrange in inverted index order Core engine<br />

Logic SQL database<br />

The system architecture graph of the search system is<br />

shown as “Fig. 1”.<br />

In the search system, the following mandatory access<br />

control is adopted in the search process [9]. Access<br />

control label is used in specific designer, and it is divided<br />

into two parts: security classification and group sets.<br />

Security level can be expressed as: L= (C,G), and C<br />

is security grade, and G is the group of set. Two security<br />

level: L1= (C1,G1) 、L2= (C2,G2) .If and only if C1<br />

≥ C2 and G1 include G2, L1 ≥ L2 is correct.<br />

All operation of subject to object are abided by simplesecurity<br />

property and *_ property principle:<br />

(1) When Ls≥ Lo, subject S can read object O, and it<br />

is called down-read.<br />

(2) When Ls≤ Lo, subject S can write object O, and it<br />

is called up-write.<br />

Audit function is enhanced in the search system based<br />

on database. All operation related events are audited, and<br />

they increase the security of the search system.<br />

LogicSQL-based Enterprise search system achieves<br />

more accurate positioning information, and it realizes the<br />

value from the information across to the knowledge.<br />

ACKNOWLEDGMENT<br />

The authors wish to thank Wang Baohua. This work<br />

was supported in part by a grant from the Industrial<br />

Research Project of Guizhou Province under (Grant No.<br />

[2008]5014) and the Science and Technology Funds of<br />

Guizhou Province (Grant No.[2009]2125), the Stadholder<br />

Foundation of Guizhou Province (Grant No. 2009-111),<br />

and the Funds of Chongqing University of Arts and<br />

Sciences(Grant No. Y2009JS57, 68 and 69).<br />

REFERENCES<br />

[1] ORACLE DATA SHEET, Oracle Ultra Search,<br />

http://www.oracle.com/index.html, February 2010.<br />

[2] Enterprise Portal Overview and User Guide, Sybase<br />

Enterprise Portal, LAST REVISED: May 2000.<br />

[3] Yuan Liyan, ShiFang Enterprise Information Real-Time<br />

Archive and Search System. http://www.shifang. com.cn/p<br />

roducts, July 2009.<br />

[4] Internet Search, http://home.mcom.com/home/ internetsearch.html,<br />

February 2010.<br />

[5] Search Engines Guide, http://www.searchengineguide.com<br />

/searchengines.html, February 2010.<br />

[6] http://en.wikipedia.org/wiki/Enterprise_search, February<br />

2010.<br />

[7] Differences Between Internet vs. Enterprise Search, Last<br />

Updated Feb 2009.http://www.ideaeng.com/tabId/98/itemI<br />

d/154/20-Differences-Between-Internet-vs-Enterprise- Se.<br />

aspx#sec, February 2010.<br />

[8] Yuan Liyan. The Documentation of Logic SQL [ M ].<br />

Alberta University Press, Canada. 2005, pp.1-15<br />

[9] Baohua Wang, Danning Li, Zhengyong Zhao, Xinqiang<br />

Ma,Dan Li. Research and Realization of Enterprise<br />

Security Search Application System Based on Database.<br />

Journal of Computational Information Systems.<br />

Vol.3(5).1841-1846. 2007.10.<br />

Figure 1. Web crawler architecture<br />

241

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!