期刊文献+

基于用户-角色-功能的个性化权限控制策略模型 被引量:3

Based on user-role function’s individuality privileges control strategy model
下载PDF
导出
摘要 对B/S模式信息系统的安全权限控制策略进行了研究,根据目前权限控制存在的缺陷,提出了基于用户-角色-功能的个性化权限控制模型,实现了根据用户的不同分工灵活组装功能来定制界面。把最小操作功能当作原子,系统界面当作分子,利用了分子由原子组成的思想。该模型有效地保证了信息系统数据的安全性,具有很强的通用性和扩展性。 This article has researched on the B/S pattern information system safety privileges control strategy, according to the existence flaw of present privileges control strategy, proposed an individuality Safety privileges control strategy model which based on the user-role-function and the user interface. Based on this model has realized customized user interface according to user's different division of labor nimble. Treat the smallest operation functions as the atom, the system surface as the molecule, has usecl the thought of that molecule is made of atoms. This model can guarantee the information system data's security effectively, has the very strong versatility and the extension.
出处 《齐齐哈尔大学学报(自然科学版)》 2007年第5期40-43,共4页 Journal of Qiqihar University(Natural Science Edition)
基金 "基于SVG新技术的油田WebGIS平台研究"该项目得到黑龙江高等学校青年学术骨干支持计划项目资助(项目编号:1151G002)
关键词 信息系统 安全 权限控制 界面定制 information system safety privileges control customized user interlace
  • 相关文献

参考文献5

  • 1Sandhu R S. Role-based Access Control Models[J]. Computer IEEE,1996,29(2):38-47.
  • 2Moyer M J. Generalized Role-based Access Control[C]. 21th IEEE International Conference on Distributed Computing, Sydney,Australia,2001:67-68.
  • 3张祖平,王磊.基于多种模式的权限控制技术研究[J].计算机工程,2006,32(1):177-179. 被引量:18
  • 4David F Ferraiolo, John F Barkley, D Richard Kuhn. A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet[J]. ACM Transaction on Information and System Security, 1999,2(1):34-43.
  • 5Al-Kahtani MA, Sandhu RS. A Model for Attribute-based User-role Assignment[C]. 18th Annual Computer Security Applications Conference,2002:353-364.

二级参考文献5

  • 1Sandhu R S. Role-based Access Control Models[J]. Computer IEEE,1996, 29(2):38-47.
  • 2Moyer M J. Generalized Role-based Access Control[C]. 21^th IEEE International Conference on Distributed Computing, Sydney,Australia, 2001:67-68.
  • 3Kern A, Schaad A, Moffett J. An Administration Concept for the Enterprise Role-based Access Control Model[C]. Proceedings of the Eight ACM Symposium on Access Control Models and Technologies,Como, Italy, 2003-07:3-11.
  • 4董乐红,耿国华,周明全.一种基于ASP技术的Web MIS权限控制系统的设计[J].计算机工程,2003,29(10):127-128. 被引量:5
  • 5栗松涛,李春文,孙政顺.一种新的B/S系统权限控制方法[J].计算机工程与应用,2002,38(1):99-101. 被引量:28

共引文献17

同被引文献9

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部