期刊文献+

基于RBAC的权限管理系统的设计与实现 被引量:7

Design and Implementation of Authorization Management System Based on RBAC
下载PDF
导出
摘要 随着全球网络化的热潮,网络技术正在日益广泛而深入的被应用的社会的各个领域当中,与此同时,网络安全却成为日益严重的问题。从系统设计实现的角度,对基于RBAC的权限管理系统的体系结构、功能模块及实现的关键技术进行了研究与实践。该系统以Spring框架为基础,采用MVC模式,实现用户和权限的分离,具有权限分配直观、扩展性好,支持岗位、权限多变的需求。在访问控制组件的设计中,利用control层的拦截器(interceptor)进行权限和用户身份的验证,实现系统的安全机制。 With the tide of global internet, network technology has already been used in many fields extensively. At the same time ,the network security becomes a more and more serious issue. From the design and implement of the system, the architecture of RBAC - based the authority management system, the function modules and the core technique using in implement have been researched and designed. The system which takes Spring framework as a foundation and uses MVC pattern,implements the separation of users and privileges and has intuitive assignment of privilege and has good extension and supports the changeable demand of posts and privileges. In the access control module design, the interceptor of the control level confirm the privilege and identity, and then implement the system security mechanism
出处 《计算机与数字工程》 2008年第5期100-103,共4页 Computer & Digital Engineering
关键词 RBAC SPRING 访问控制 拦截器 RBAC,spring,access control,interceptor
  • 相关文献

参考文献5

二级参考文献12

  • 1李芳,范玉妹,胡志兴.操作系统安全模型研究及方案设计[J].微计算机信息,2004,20(9):126-128. 被引量:10
  • 2伏汉英,陈海勇,黄永忠.基于SDSI规范的角色信任传递模型[J].微计算机信息,2005,21(06X):12-14. 被引量:6
  • 3Ravi Sandhu,Edward Coyne,Hal Feinstein,Charles Youman.Role-Based Access Control Model[J].IEEE Computer,1996,29(2):38-47.
  • 4Extensible Markup Language (XML) 1.0[EB/OL].http://www.w3.org/TR/REC-xml.1998.
  • 5XSL Transformations (XSLT) Version2.0[EB/OL].http://www.w3.org/TR/xslt20.2005.
  • 6Rick Kuhn.Role Based Access Control[EB/OL].http://csrc.nist.gov/rbac/rbac-std-ncits.pdf,2003.
  • 7Rick Kuhn.Role Based Access Control[EB/OL].http://csrc.nist.gov/rbac/rbac-std-ncits.pdf,2003.[5]Mario Storga.XML-based Web Service for Collaborative ProductData Management[EB/OL].http://www.ice2002.org,2002.
  • 8David F Feraiolo, Ravi Sandhu, Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control [J]. ACM Transactions on Information and System Security, 2001,(3):224-274.
  • 9Ravi Sandhu, Edward j Coyne. Role-based Access Control Models [Jl. Computer, 1996,(2):38-47.
  • 10Ferraiolo D,Sandhu R,Gavrila S.A Proposed Standard for Role Based Access Control[J].ACM Transactions on Information and System Security,2001,4(3)

共引文献26

同被引文献39

引证文献7

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部