期刊文献+

采用J2EE安全机制支持RBAC模型的研究和实现 被引量:7

Research and Realization of RBAC Using J2EE Security Mechanisms
下载PDF
导出
摘要 实现了用J2EE安全机制来支持RBAC模型的方法。给出了J2EE保护系统的配置,并设计一个鉴权决定算法。用J2EE安全的描述语言定义了RBAC模型,给出了实现J2EE安全服务的需求。通过在国家科技基础条件平台的部署和应用,取得了预期的效果。 The method using J2EE security mechanisms to support RBAC is shown in this paper. First, the configuration of J2EE security systems is given in the paper and the algorithm of J2EE authorization decision is designed. Then, the language of J2EE security description is used to define RBAC, and the realization of the requirement of J2EE security service is given. It has achieved the anticipative effect in virtue of deployment and application on the platform of the national science technology infrastructure.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第13期125-127,共3页 Computer Engineering
基金 科技部基金资助项目"国家科技基础条件平台"(2003DKA5G015)
关键词 RBAC J2EE 访问控制 鉴权 RBAC J2EE Access control Authorization
  • 相关文献

参考文献5

  • 1Sun Microsystem Inc.Java^TM 2 Platform Enterprise Edition Specification(V 1.4)[Z].2003.
  • 2Sandhu R S,Cornc E J.Role-based Access Control Models[J].IEEE Computer,1996,29(2):38.
  • 3Lang U.Access Policies for Middleware[Z].http://www.cl.cam.ac.uk/TechReports/,2003.
  • 4Crook R,Ince D,Nuseibeh B.Towards an Analytical Role Modelling Framework for Security Requirements[C].Proc.of the 8^th International Workshop on Requirements Engineering:Foundation for Software Quality,Essen,Germany,2002.
  • 5Crook R,Ince D,Nuseibeh B.Modelling Access Policies Using Roles in Requirements Engineering[J].Informaion and Software Technology,2003,45(14).

同被引文献35

引证文献7

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部