期刊文献+

基于AOP的RBAC系统的设计与实现 被引量:4

The Design and Implement of AOP-based RBAC System
下载PDF
导出
摘要 针对传统基于角色的访问控制(RBAC)实现方法在企业应用中存在的不足,将面向切面(AOP)的设计思想引入到RBAC系统的设计中,通过将系统的权限验证模块封装成单独的模块,与核心业务模块解耦合,在调用核心业务模块时借助动态AOP框架将权限验证模块在运行时动态地织入,从而实现一种通用的、可维护的、易扩展的权限验证系统。 In order to improve the application of role-Based access control in enterprises, an aspect-oriented programming design concept to RBAC system is introduced in this paper. By uncoupling the system authorization module from core business modules to an encapsulation, and dynamically embedding the authorization module under AOP framework when core business modules are called, we realize a universal, maintainable and extendable authorization system.
机构地区 东华大学
出处 《计算机安全》 2009年第5期43-45,共3页 Network & Computer Security
关键词 RBAC AOP 权限管理 角色 访问控制 RBAC AOP Authorization Role Access Control
  • 相关文献

参考文献3

二级参考文献21

  • 1陈章渊 张学东 等.智能CORBA[M].北京:电子工业出版社,1999..
  • 2潘爱民.COM原理与应用[M].北京:清华大学出版社,2000..
  • 3SUN Microsystems. Java Servlet Specification Version2.3 [ R ].SUN Microsystems, 2000.
  • 4Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 2001,4(3):224-274.
  • 5Osbom S, Sandhu R. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 2000,3(2):85-106.
  • 6AHN G-J, Sandhu R. Role-Based authorization constraints specification. ACM Transactions on Information and System Security, 2000,3(4):207-226.
  • 7Sandhu R. Issues in RBAC. In: Youman C, Sandhu R, Coyne E, eds. Proceedings of the 1st ACM Workshop on Role-based access control. ACM Press, 1996. 21-24.
  • 8Ferraiolo D, Kuhn R. Role based access control. In: Proceedings of the 15th National Computer Security Conference, National Institute of Standards and National Computer Security Center. 1992. 641-650.
  • 9董光宇 卿斯汉 刘克龙.带时间特性的角色授权约束.软件学报,2002,13(8):1521~1527[EB/OL].http://www.jos.org.cn/1000-9825/13/1521.pdf.,.
  • 10董光宇 卿斯汉 刘克龙.带时间特性的角色授权约束.软件学报,2002,13(8):1521~1527.http://www.jos.org.cn/1000-9825/13/ 1521.pdf.,.

共引文献87

同被引文献16

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部