期刊文献+

基于角色的访问权限控制在ERP系统中的应用 被引量:6

Role-Based Access Control and Its Implementation in Enterprise Resource Planning (ERP)
下载PDF
导出
摘要 论述并扩充了基于角色的访问权限控制 (RBAC)模型 ,提出了一套适用于ERP系统的权限控制应用模型 ,在此基础上运用面向对象分析与设计的思想 ,定义了功能对象、功能对象的授权属性、授权属性的级别、系统角色等对象 ,对ERP系统的授权粒度进行了细致的划分 ,从而能够描述复杂的安全策略 ,并且有效地实现权限管理。在HZ ERP实际开发与实施过程中 ,证明了该模型的优越性。 In this paper, we discuss and improve the role- ba sed access control model and put forward a set of access control model for ERP s ystem. By using the object-oriented analysis and object oriented design method, we define sorts of function objects, authorization properties of function objec t, levels of authorization property, system roles, etc. Thus, the ERP system hav e reasonable authorization granularity and be able to describe complicated secur ity strategy. The model has been proved to be useful in our development and impl ementation of the HZ-ERP system.
出处 《机械科学与技术》 CSCD 北大核心 2004年第9期1025-1029,共5页 Mechanical Science and Technology for Aerospace Engineering
关键词 基于角色的访问控制 ERP 功能对象 授权属性 Role based access control ERP Function object Authorization property
  • 相关文献

参考文献9

二级参考文献15

  • 1[2]Leymann.F, Roller.D. Workflow based application[J] .IBM System Journal, 1997.36(1)
  • 2[3]Shen Hong-hai , Dewan P. Acess control for collaborative environments[C]. Proceedings of the ACM CSCW'92 Confercnce on Computer Supported Cooperative Work. 1994,51~58
  • 3[5]Feraiolo D F , Kuhn R. Role-based access control[C]. Proceedings of the 15th National Computer Security Conference . 1992. 554~563
  • 4[6]Sandu R S , Coyne E J, Feinstein H L .Role-based access control models[J]. IEEE Computer,1996,29(2):38~47
  • 51,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 62,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 73,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 84,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 95 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm
  • 10Ahn G J,Proceedings of 5th ACM Workshop on Role Based Access Control,2000年

共引文献218

同被引文献34

引证文献6

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部