期刊文献+

基于RBAC的权限管理系统的设计与实现 被引量:3

Design and Implementation of Permission Management System Based on RBAC
下载PDF
导出
摘要 RBAC的核心思想就是将访问权限与角色相联系,通过给用户分配角色,使用户与访问权限间接关联。通过对RBAC模型的分析,提出了基于该模型的权限管理系统的实现方案,并采用ASP.NET、ADO.NET等技术进行实现,满足企业信息系统权限管理方便性、安全性、高效性。 The core idea of RBAC is the role of access and linked to the user through the allocation of roles, allowing users to access and indirectly related. Through analysis of the RBAC model, based on the model of the Rights Management System system, and using ASP. NET, ADO. NET and other technologies to achieve, to meet the enterprise information system to facilitate rights management, security, and efficient.
作者 林尤舜 钟声
出处 《现代机械》 2009年第3期59-60,共2页 Modern Machinery
关键词 角色访问控制 设计 权限管理系统.NET RBAC design permission management system . NET
  • 相关文献

参考文献3

  • 1Ravi S. Sandhu,Edward J. Coyne, Hall. Feinstein, and Charles E. Youman, Role-Based Access Control Models [J]. IEEE Computer 1996 29 (2) : 38-47
  • 2Sanbu R, Bhamldipati V, Cone E, et al. The ARBAC97 Model for Role Based Administration of Roles[ J ]. ACM Transactions Information and System Security, 1999,2( 1 ) :105-135
  • 3汪厚祥,李卉.基于角色的访问控制研究[J].计算机应用研究,2005,22(4):125-127. 被引量:61

二级参考文献10

  • 1Ravi S Sandhu, David Ferraiolo,Richard Kuhn. The NIST Model for Role-based Access Control: Towards an Unified Standard [ J/OL ].ACM. 2000.47-63.
  • 2David F Feraiolo, Ravi Sandhu,Serban Gavrila, et al. Proposed NIST Standard for Role-based Access Control[ J]. ACM Transactions on Information and System Security, 2001, (3) :224-274.
  • 3Ravi Sandhu, Edward J Coyne. Roie-based Access Control Models[ J]. Computer,1996, (2) :38-47.
  • 4Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 Model for Role-based Administration of Roles[ J]. ACM Trans. on Information and Systems Security, 1999, ( 1 ) : 105-135.
  • 5Sylvia Osbom, Yuxia Guo. Modeling Users in Role-based Access Control[ C]. Berlin:Proceedings of the 5th ACM Workshop on Rolebased Access Control( RBAC-00), 2000.26-27.
  • 6Ahn GJ, Arvisandhu. Role-based Authorization Constrains Specification [ J]. ACM Transcations on Information and System Security,2002, ( 3 ) :207-226.
  • 7马建平,余祥宣,洪帆,张江陵.基于角色的安全策略[J].计算机研究与发展,1998,35(5):447-450. 被引量:15
  • 8施景超,孙维祥,许满武.基于角色的存取控制及其实现[J].计算机应用研究,2000,17(6):13-15. 被引量:48
  • 9李孟珂,余祥宣.基于角色的访问控制技术及应用[J].计算机应用研究,2000,17(10):44-47. 被引量:80
  • 10曹天杰,张永平.管理信息系统中基于角色的访问控制[J].计算机应用,2001,21(8):21-23. 被引量:44

共引文献60

同被引文献26

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部