期刊文献+

基于WY-CMS用户-角色-功能的通用性的权限控制策略

The Access Control Strategy based on WY-CMSV the User-role-Function Versatility
在线阅读 下载PDF
导出
摘要 针对网站内容管理系统中面临的安全性管理要求和其在软件应用中的不足,在分析基于角色的访问控制技术原理的基础上,研究了改进方法。根据目前权限控制存在的缺陷,提出了基于用户-角色-功能的个性化权限控制模型,实现了根据用户的不同分工灵活组装功能来定制界面。该模型有效地保证了信息系统数据的安全性,具有很强的通用性和扩展性。着重详细介绍了模型的设计思想,权限管理的框架、数据库设计和用户界面的动态生成。系统运行结果表明使用这种控制方法,不同身份的用户登录验证后具有不同的交互界面,提高了系统的易用性、交互性和健壮性,丰富了业务逻辑控制细粒度。 On the basis of the security requirement of a website content management system, The analysis of role-based access control technique, based on research to improve the method. According to the current gaps in access control, based on the user-role-functional personalized access control model, the realization of a different division of labor according to the assembly of the functional flexibility to customize the interface. The model effectively ensure the information systems data security, has a strong versatility and scalability. Focus on detailed design of the model, a framework for rights management, database design and user interface dynamically generated. The results show that the system using this control method, different users log on to verify identity after interaction with different interfaces, to improve the system's ease of use, interactive and robust, rich fine-grained control of the business logic.
机构地区 太原理工大学
出处 《电脑开发与应用》 2009年第10期17-19,共3页 Computer Development & Applications
关键词 RBAC 权限 细粒度 角色 Role-Based Access Control, permission, fine grit, role
  • 相关文献

参考文献5

二级参考文献16

  • 1郑诚.电量电费管理系统的设计与实现[J].安徽大学学报(自然科学版),1997,21(1):77-83. 被引量:4
  • 2D Ferraio, J Cugini, R Kuhn. Role-Based Access Control ( RBAC ) :Features and Motivations [ C ]. New Orleans, LA : Proceedings of the 1 1 th Annum Computer Security Application Conference, 1995.12-14.
  • 3David F Ferraiolo, John F Barkley, D Richard Kuhn. A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet [ J ]. ACM Transactions on Information and System Security, 1999,2( 1 ) :34-43.
  • 4Sejong Oh, Seog Park. Task-Role-Based Access Control Model [ J].Information Systems, 2003,28 ( 6 ) :533 - 536.
  • 5Alur D, Crupi J, Malks D. Core J2EE Patterns: Best Practices and Design Strategies. Pearson Education Inc., 2001
  • 6Booth G, Rumbaugh J, Jacobson I. The Unified Modeling Language User Guide. Addison Wesley Longman Inc., 1999
  • 7Flanagan D. Java in a Nutsbell(Third Edition). O'Reilly & Associate Inc., 1999
  • 8StevensWR 施振川 周为民 孙宏辉译.UNIX网络编程(第1卷)[M].北京:清华大学出版社,1999..
  • 9刘湛.J2EE全面简介[EB/OL].http://www-900.ibm.com/developerWorks/cn/java/j2ee/index.shtml,.
  • 10萨师煊 王珊.数据库系统概论(第3版)[M].北京:高等教育出版社,2002..

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部