期刊文献+

一种优化的复合数据权限模型研究和实现

Research and Implementation of an Optimized Compound Data Access Control Model
下载PDF
导出
摘要 随着企业级ERP系统规模的不断扩大,业务数据和基础数据越来越庞大和复杂。传统的复合数据权限方案采用递归的方式查询数据,只能满足一些日常的小数据量操作,对于大数据量的访问操作,往往响应时间过长,难以满足用户需求,影响了用户体验。为了提高响应速度,减少数据过滤时间,同时保证数据的安全性,在传统数据权限模型的基础上,引入了一种改进的前序遍历树算法,对传统模型进行优化,并对其进行设计和实现,提高了查询访问速度,完全满足了用户需求。 The business data and basic data become giant and complex with the development of ERP system.It's difficult to handle huge data operation with the traditional compound data access control model using recursive method,and the user response time becomes too long.In order to decrease the response time and guard the data safety,based on the traditional model,an improved nested set algorithm is brought,the traditional model is optimized and the design and implementation are given.So it can optimize the query access. In the implemention,the HR area code tree and organization tree is used,so it can simplify the right configuration.
出处 《控制工程》 CSCD 北大核心 2010年第S3期144-146,158,共4页 Control Engineering of China
关键词 改进的前序遍历树算法 数据权限模型 ERP 邻接列表算法 improved nested set algorithm data access control model ERP adjacent list algorithm
  • 相关文献

参考文献4

二级参考文献31

  • 1Leong K K,Yu K M, Lee W B. A security model for distributed product data management system. Computers in Industry, 2003,50:179-193
  • 2Botha R A, Eloff J H P. Access Control in Document-centric Workflow Systems- An Agent-based Approach. Computers & Security, 2001,20(6) : 525-532
  • 3Cheng E C. An object-oriented organizational model to support dynamic role-based access control in electronic commerce. Decision Support Systems, 2000,29 : 357- 369
  • 4Castano S, Martella G, Samarati P. Analysis, comparison and design of role-based security specifications. Data & Knowledge Engineering, 1997,21:31-55
  • 5Bellettini C,Bertino E,Ferrari E. Role Based Access Control Models. Information Security Technical Report, 2001,6(2) :21-29
  • 6Oh S, Park S. Task-role-based access control model. Information Systems, 2003,28:533 -562
  • 7Ahn G J, Hongb S P, Shin M E. Reconstructing a formal security model. Information and Software Technology, 2002,44:649-657
  • 8K K Leong, K M Yu, W B Lee. A security model for distributed product data management system[J]. Computers in Industry, 2003,50:179-193.
  • 9Reinhardt A Botha, Jan H P Eloff. Access Control in Document-centric Workflow Systems-An Agent-based Approach[J]. Computers & Security, 2001,20(6):525-532.
  • 10Edward C Cheng. An object-oriented organizational model to support dynamic role-based access control in electronic commerce[J]. Decision Support Systems, 2000,29:357-369.

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部