期刊文献+

网站后台管理系统的用户权限管理的一种实现方案 被引量:15

An Implementation Scheme for User Permissions Management in the Website Backstage Management System
下载PDF
导出
摘要 针对一般网站后台管理系统的权限管理功能的需要,实现了一个基于角色和权限集的权限管理子系统,使用了文本文件保存后台用户和权限设置数据。具有较好的灵活性和可扩展性,能够很方便地部署和维护。 Given the demand of the permissions management requirements in the website backstage management system, this paper implements a permissions management system based on roles and permission sets, which uses text files to save data of backstage users and permissionsettings. The implementation scheme has the advantages of flexibility and expansibility and can be deployed and maintained easily.
出处 《电子科技》 2006年第10期62-67,共6页 Electronic Science and Technology
关键词 后台管理系统 权限集 权限管理 backstage management system permissions set permissions management
  • 相关文献

参考文献2

二级参考文献14

  • 1Delegation N L.Logic_A Logic-based Approach to Distributed Authorization.ACM Transactions on Information and System Security ,2003 ;6( 1 ) : 128.
  • 2Woo Y C,Lam S S.Authorization in distributed systems:A formal approach.In:Proc 13th IEEE Computer Society Symposium on Research in Security and Privacy.Oakland,CA, 1992:33.
  • 3Theimer M M,Nichols D A,Terry D 'B.Delegation through Access Control Programs.In:Proc 12th Internaitonal conference on Distributed Systems.IEEE Press, 1992.
  • 4Kapadia A,Muhtadi J A,Campbell R H et al.IRBAC 2000:Secure Interoperability Using Dynamic Role Translation.Technical Report UIUCDCS-R-2000-2162,University of Illinois, 2000.
  • 5Denker G,Millen J,Miyake Y.Cross-domain Access Control via PKI.In:Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks(POLICY.02).IEEE Press, 2002.
  • 6Shands D,Yee R,Jacobs Jet al.Secure Virtual Enclaves:Supporting Coalition Use of Distributed System.In:Proceedings of Network and Distributed System Security Symposium(NDSS 2000), 2000.
  • 7Blaze M,Feigenbaum J,Ioannidis Jet aLThe KeyNote Trust-Management Version 2.RFC 2704,1999.
  • 8Elien J E.Certificate Discovery Using SPKI SDSI 2.0 Certificates.Master thesis at M.I.T ECSE, 1998.
  • 9Ninghui L,Winsborough W H,Mitchell J C.Distributed Credential Chain Discovery in Trust Management(Extended Abstract).In Proc.8th ACM Computer and Communication Security(CCS01), 2001 : 156.
  • 10Freudenthal E, Pesin T, Port L et al.dRBAC : Distributed Role-based Access Control for Dynamic Coalition Environments.Technical Report TR2001-819,New York University, 2001.

共引文献12

同被引文献49

引证文献15

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部