期刊文献+

基于区域权限系统的设计与实现

Design and implementation of system based on the regional authority
下载PDF
导出
摘要 针对国家气象服务中心的实际要求,建立供各级公共气象服务中心开展公众气象服务调查、满意度调查使用的公共气象效益评估系统,提出了权限控制与区域关联,是基于区域权限的系统。不但需要实现权限控制,更重要的是对于不同级别用户,数据具有不同的可见性。实践证明,基于区域的权限控制访问技术,不仅能够使各级用户的管理更加自由灵活,同时也较大程度地提高了信息安全。 Aiming at the practical requirements of National Weather Service to establish assessment system of public weather efficiency for all levels of public weather services to carry out the survey of public weather services and satisfaction. The aeeess control and regional association were proposed based on the regional authority system. It didn't need to implement access control only, more important, the data had different visibility to different levels of users. Practice shows that region-based access control technology, not only can make the users at all levels of management more freedom and flexibility, but also can improve the information security effectively.
出处 《电子设计工程》 2011年第3期124-127,共4页 Electronic Design Engineering
关键词 区域权限 系统设计 隶属 气象效益评估 regional authority systems design membership meteorological benefit assessment
  • 相关文献

参考文献6

二级参考文献27

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2[1]Bell D, Padula L. Secure computer systems: unified exposition and MULTICS: [Report ESD-TR-75-306]. The MITRE Corporation, Bedford, Massachusetts, March 1976
  • 3[2]Clark D,Wilson D. A comparison of commercial and military computer security policies. In:proc. of the Symp. on Security and Privacy,IEEE Press, 1987. 184~194
  • 4[3]Sandhu R,Coyne E,Feinstein H,Youman C. Role-based access control models. IEEE Computer,1996,29(2)
  • 5[4]Ferraiolo D F,Sandhu R. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 2001,4(3)
  • 6[5]Ahn G,Sandhu R. Role-Based Authorization Constraints Specification. ACM Transactions on Information and System Security,2000,3(4)
  • 7[1]K Loney. Oracle数据库管理员教程[M].北京:机械工业出版社,1998.
  • 8[1]Ravi S Sandhu,Edward J Coyne,Hal L Feinstein et al.Role-based access control models[J].IEEE Computer,1996;29(2) :38~47
  • 9[2]American National Standards Institute.American National Standard for Information Technology- Role Based Access Control[S].http://csrc.nist.gov/rbac/ ,2003
  • 10[4]Ravi Sandhu,Venkata Bhamidipati,Qamar Munawer.The ARBAC97 model for Role-based administration of Roles[J].ACM Transactions on Information and System Security,1999 ;2 (1):105~135

共引文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部