期刊文献+

B/S模式下OA系统的权限控制设计与实现 被引量:25

The Design and Implementing of Authorization Control of OA in B/S Mode
下载PDF
导出
摘要 通过分析现有权限控制模型,结合B/S模式的特征,论文提出了改进的权限控制模型,与在OA系统中的具体实现方法。 Through analyzing authorization control nowadays and characteristic of B/S mode,the paper puts forward a kind of mode of authorization control in B/S mode and introduces the method of implementing the mode in OA.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第35期199-201,210,共4页 Computer Engineering and Applications
关键词 用户管理 权限控制模型 B/S模式 OA系统 user management ,authorization control,B/S,OA
  • 相关文献

参考文献3

二级参考文献16

  • 1孟宪虎,张延军.开发WEB应用程序的可靠性和安全性探讨[J].计算机工程与应用,2001,37(14):74-75. 被引量:14
  • 2[1]Sandhu R, Coyne E, Feinstein H, et al. Role-based access control model[J]. IEEE Computer, 1996,29(2):38-47.
  • 3[2]Sandhu R, Ferraiolo D, Kuhn R. The NIST model for role-based access control: Towards a unified standard[Z]. The Fifth ACM Workshop on Role-Based Access Control, Berlin, 2000.
  • 4[3]Sandhu R, Munawer Q. The ARBAC99 model for administration of roles[EB/OL]. http:∥www.list.gmu.edu/conference-papers.htm,2000-11-01/2001-03-08.
  • 5[4]Goh C, Baldwin A. Towards a more complete model of role[Z]. The Third ACM Workshop on Role-Based Access Control, Fairfax, VA, 1998.
  • 6[5]Moffett D, Lupu C. The uses of role hierarchies in access control[Z]. 4th ACM Workshop on RBAC, Fairfax, VA,1999.
  • 7[6]Osborn S, Sandhu R, Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security, 2000,3:85-106.
  • 8[1]Sandhu R,Ferraiolo D,Kuhn R.The NIST model for role-based access control:towards a unified standdard[C].In:Proceeding of 5th ACM Workshop on Role-Based Access Control,ACM,Berlin,Germany,2000-07
  • 9[2]Sylvia Osborn,Ravi Sandhu,Qamar Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies[J].ACM Transactions on Information and System Security,2000;3(2)
  • 10[3]Sandhu R,Coyne E J,Feinstein H L et al. Role-baseed access control model[J].IEEE Computer,1996;29(2)

共引文献44

同被引文献83

引证文献25

二级引证文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部