期刊文献+

教研管理系统权限模块的设计与实现 被引量:4

Design and Implement of Authority Model in Teaching Management System
下载PDF
导出
摘要 教研管理系统包含的部门及工作人员的类别较多,保证数据安全是整个系统设计的关键部分,本系统采用基于角色的访问控制(RBAC)策略可以很好地满足整个系统对数据的安全性和系统维护方便性的要求.RBAC策略通过引入角色的概念,使用户不直接操作功能权限,从而降低了权限管理的复杂性,而且用户和功能数量可以根据需要增加,各级管理员可以按需分配角色,满足了系统的可扩展性要求.最后对该权限模块进行了安全性分析,结果表明,在安全性能上能够满足两个著名的安全原则:职责分离原则和最小特权原则,具有很好的动态适应性. Because of various kinds of departments and staff in teaching management system, ensuring data security is the key part of the whole system design. Role-based access control (RBAC) strategy is used to satisfy the data security and maintenance convenience in the whole system. By introducing the con- cept of role, the users do not operate function authority directly so as to reduce the complexity of authority management. The amount of users and functions may increase according to their needs, and administrators of different levels can assign their own roles, which meet the system's scalability requirements. At last the security of the model is analyzed. The result shows that RBAC in this model supports two security princi- ples such as least privilege and separation of duty, and it has good dynamic adoption.
出处 《河北北方学院学报(自然科学版)》 2010年第4期57-62,共6页 Journal of Hebei North University:Natural Science Edition
关键词 管理系统 RBAC 访问控制 角色 management system RBAC access control role
  • 相关文献

参考文献7

二级参考文献20

  • 1李芳,范玉妹,胡志兴.操作系统安全模型研究及方案设计[J].微计算机信息,2004,20(9):126-128. 被引量:10
  • 21,Pfleeger C P. Security in Computing, Edition 2. Prentice-Hall, 1997
  • 32,Gallagher P R. Security of electronic information. The National Computer Security Center: Technique Report NCSC-TG-021, 1991
  • 43,Castano S, Fugini M, Martella G et al. Database Security. ACM Press & Addison-Wesley, 1994
  • 5McLean J. Security Models and Information Flow. In:IEEE Symposium on Security and Privacy, pp. 180-189.
  • 6Ferraiolo D, Cugini J, Kuhn D R. Role Based Access Control: Features and Motivations. In Annual Computer Security Applications Conf IEEE Computer Society Press, 1995.
  • 7Ferraiolo D,Kuhn D R. Role Based Access Control. In:the Proc of the 15th National Computer Security Conf. Vol Ⅱ ,1992. 554-563.
  • 8RBAC in the Solaris [tm] Operating Environment. wwws. sun.com/soft ware/whitepapers/wp-rbac /.
  • 9Chandramouli R,Sandu R. Role Based Access Control Features in Commercial Database Management Systems. In: 21^st National Information Systems Security Conf. Oct. 1998.
  • 10Sandhu R S, Coyne E J, Feinstein H L, Youman C E. Role-based access control models. IEEE Computer, 1996,29(2) : 38-47.

共引文献119

同被引文献10

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部