期刊文献+

基于角色的业务审批模型的设计与实现

Design and Implementation of Role-based Examining and Approving Model
在线阅读 下载PDF
导出
摘要 以江西省医疗保险系统中的业务审批流程为对象,设计了一种审批权限管理控制模型。采用基于角色的访问控制技术(RBAC),通过引入角色的概念,使得用户审批权限管理条理化,业务审批无纸化。该模型具有高扩展性、易维护的特点,最后给出其在实际系统中的实现。 This paper designs a kind of examining and approving privilege administrative model based on the business approval process in the medical insurance system of Jiangxi province. We adopt Role-Based Access Control (RBAC) technology and introduce the role conception. It makes that the administration of user' s examining and approving privilege is systematic, the process of business approval is paperless. The model is of several features, such as high expansibility and easy maintenance. And the realization process of this model is given at last.
出处 《计算机与现代化》 2007年第11期65-67,共3页 Computer and Modernization
关键词 角色控制 业务审批 RBAC模型 无纸化 role control business examining and approving RBAC model paperless
  • 相关文献

参考文献4

二级参考文献13

  • 1杨春程,鄢萍,李飞,刘颖.企业应用系统中权限控制及实现[J].现代制造工程,2005(1):25-27. 被引量:3
  • 2汪厚祥,李卉.基于角色的访问控制研究[J].计算机应用研究,2005,22(4):125-127. 被引量:61
  • 3[美]DavidJKruglinski ScotWingo GeorgeShepherd.Programming Visual C++6.0技术内幕(第5版)[M].北京:希望电子出版社,1999..
  • 4Fverraiolo D,Kuhn R.Role-based Access Control[C].Proceedings of 15^th National Computer Security Conference,1992.
  • 5Sandhu R,Coyne E,Feinstein H,et al.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38-47.
  • 6Ferraiolo D,Sandhu R,Gavrila S.A Proposed Standard for Role Based Access Control[J].ACM Transactions on Information and System Security,2001,4 (3).
  • 7American National Standard 359-2004 is the Information Technology Industry Consensus Standard for RBAC[EB/OL].http://csrc.nist.gov/rbac/,2005-10-20.
  • 8Jaeger T.On the Increasing Importance of Constraints[C].Proceedings of 4^th ACM Workshop on Role-based Access Control,1999:33-42.
  • 9Bertino E,Bettini C,Ferrari E.An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning[J].ACM Trans.Database Syst.,1998,23(3):231-285.
  • 10Gal A,Atlurl V.An Authorization Model for Temporal Data[C].Proceedings of 7^th ACM Conference on Computer and Communication Security,2000:144-153.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部