期刊文献+

基于角色访问控制的OA系统的实现 被引量:2

Implementation of OA System Based on RBAC
下载PDF
导出
摘要 办公自动化(OA)系统的出现,极大地改变了企业以及政府部门的办公方式,提高了办公效率。但是由于一般OA系统的用户众多,因而经常出现授权困难的问题。基于角色的访问控制技术为解决这一问题提供了一条可行路径。本文结合某高校的实际应用系统介绍了一种基于角色访问控制的OA系统的实现方法。 The appearance of OA system has greatly changed the working mode of enterprise and government, and has improved tbe working efficiency. But the large number of users leads to the difficulty of warrant. The technique of role-based access control provides an approve way to solve the problem, Combined with the practical system, this paper introduces an achieve method of OA system based on RBAC.
出处 《计算机与现代化》 2007年第10期6-8,共3页 Computer and Modernization
关键词 办公自动化 角色访问控制 权限驱动 OA Role-based Access Control(RBAC) purview drive
  • 相关文献

参考文献4

二级参考文献22

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2David F Ferraiolo, Ravi Sanehu. Proposed NIST Standard:Role-Based Access Control. ACM Transactions on Information and System Security, August 2001, 4(3): 224~274.
  • 3David F Ferraiolo, John F Barjkety, D Richard Kuhn. A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet. ACM Transactions on Information and System Security, February 1999, 2(1):34~64.
  • 4Sofia Tzelepi and George Pangalos. A Flexible Role-Based Access Control Model for Multimedia Medical Image Database System. ISC 2001,LNCS 2200, 2001: 335~346.
  • 5Dianlong Zhang, Harald Lukhaub, Werner Zorn. A RoleBased Access Control Model and Implementation for Data-Centric Enterprise Applications. ICICS 2001, LNCS 2229,2001:316~327.
  • 6ITU-T Recommendation X.812. Security Frameworks for open Systems: Access Control Framework.
  • 7Sandhu R, Coyne E J. Role-based Access Control Models.IEEE Computer, 1996 (2).
  • 8Sandhu R. Role-based Access Control laboratory for Information Security Technology. ISSE Department, MS4A4,George Mason University, 1997.
  • 9Sandhu R, Bhamidipati V. The ARBAC97 Model for Role-based Administration of Roles: Preliminary Description and Outline. In Proceedings of the 2th ACM Workshop on Role-based Access Control, ACM,1997.
  • 10Ferraiolo D F, Barkley J F, Kuhn D R. A role-based access control model and reference implementation within a corporate intranet[J]. ACM Transactions on Information and Systems Security (TISSEC), 1999,2(1) : 34-64.

共引文献24

同被引文献21

引证文献2

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部