期刊文献+

基于Ajax的通用Web系统权限管理的设计与实现 被引量:3

Design and implementation of general Web system authority management based on AJAX
下载PDF
导出
摘要 在Web系统开发中,针对不同的业务功能及复杂权限的设置,需要重新编写权限控制代码,造成重复设计、开发的问题.基于RBAC模型,提出了采用Ajax技术实现一种通用的权限管理模块,使用此模块,无需编制代码,只需根据不同的系统需求由管理员设置相关的角色、用户和权限即可.该方案实现了权限控制和业务的分离,可以很方便地在其他Web系统中使用. For security reason,different authority codes must be programmed for different business functions and authority setting in the development of different Web systems,which results in repeated designing and coding.For this reason,a general authority control module is designed using asynchronous javascript and XML technology based on RBAC.It is easy to use this module to manage authority by setting the related role,user and authority in different Web systems without any coding.The module realizes the separation of access control with business and can easily be reused in other Web systems.
作者 朱养鹏
出处 《西安石油大学学报(自然科学版)》 CAS 北大核心 2011年第5期98-102,119,共5页 Journal of Xi’an Shiyou University(Natural Science Edition)
基金 国家863重点课题(编号:2007AA010305863) 陕西省科技计划项目(编号:2006K04-G10) 西安石油大学青年科技创新基金(编号:2010QN023)
关键词 WEB系统 权限管理 角色 异步脚本传输 web system authority management role asynchronous javascript and XML
  • 相关文献

参考文献10

  • 1Ferraiolo D F, Barkley J F, Kubn D R. A role based access control model and reference implementation within a corporate Intranet [ J ]. ACM Transactions on Information Systems Security, 1999,2 ( 1 ) :34-64.
  • 2Sandhu R, Bhamidipati V. An oracle implementation of the PRA97 Model for permission-role assignment [ C ]. Proc of the 3rd ACM Workshop on RBAC, 1998:13-21.
  • 3罗雪平,郑奕莉,徐国定.一种扩展的基于角色的访问控制模型[J].计算机工程,2001,27(6):106-107. 被引量:12
  • 4Sandhu R, Coyne E J. Role based access control models [ J ]. IEEE Computer, 1996,29 ( 2 ) : 38-47.
  • 5Covington M J. Generalized role-based access control for securing future applications [ C ]. Proc of National Information Systems Security Conference,2000 : 187-196.
  • 6Khayat E J, Abdallah A E. A formal model for flat rolebased access control[ J ]. Computer Systems and Applications ,2003,44( 3 ) :75-87.
  • 7Schneider F B. Least privilege and more[ C ]. Proceedings of the IEEE Symposium on Security and Privacy, 2003: 55 -59.
  • 8Ahn G-J, Sandhu R. Role-based authorzation constraints specification[ J ]. ACM Transactions on Information and System Security, 2000,3 ( 4 ) : 207-226.
  • 9Wainer J, Kumar A. A fine-grained, controllable user-to- user delegation method in RBAC [ C ]. Proc of the 10th ACM Symp On Access Control Models and Technologies. New York : ACM Press ,2005:59-66.
  • 10龚安,刘华山,牛秋丽,罗琳.基于Struts框架的访问控制策略[J].微计算机应用,2008,29(5):61-64. 被引量:3

二级参考文献7

共引文献13

同被引文献14

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部