期刊文献+

TUSCANY中基于角色的组件访问控制的设计与实现

Design and Realization of Role-based Component Access Control in Tuscany
下载PDF
导出
摘要 本文在Tuscany SCA Java基于角色的访问控制框架只有接口没有实现的情况下,给出了接口的具体实现,并且设计和实现了一个角色管理服务,辅助其应用于实际项目的访问控制。通过测试案例验证了在Tuscany SCA Java框架下的基于角色的访问控制实现方案的可操作性。 In this paper, We not only implemented the interface of role-based access control framework of Tuscany SCA Java, which gives definition of its interface without implementation, but also designed and implemented a role management service. It can be integrated in practice. It is verified by test cases in the Tuscany SCA Java Framework that role-based access control is operational.
出处 《微计算机信息》 2011年第12期68-70,共3页 Control & Automation
关键词 TUSCANY SCA 角色 访问控制 扩展 Tuscany SCA role access control extension
  • 相关文献

参考文献6

  • 1SOA中国第一社区.SCAServiceComponentArchitecture(SCA服务构件架构装配模型规)[EB/OL].http://www.osoa-0r∥download/attachments/35/SCA—AssemblyModel_V100.Pdf?ver-sion=1.2007—3—27.
  • 2钱玉霞 赵丹.SCA-面向服务的设计模型.科技信息(学术研究),2008,(32):337-338.
  • 3张浩,李光亚,李剑华.一种基于OSGi组件的SCA服务模型实现方案[J].微计算机信息,2010,26(27):118-120. 被引量:1
  • 4王紫瑶.SOA核心技术及应用[M].北京:电子工业出版社,2009.
  • 5Apache Software Foundation. Tuscany SCA Java[EB/OL]. http:// tuscany, apache.org/sca-java.html, 2009-10-22.
  • 6行燕,高荣芳.基于角色访问控制机制在Web信息系统中的应用[J].现代电子技术,2007,30(16):157-159. 被引量:4

二级参考文献14

  • 1麻志毅,陈泓婕.一种面向服务的体系结构参考模型[J].计算机学报,2006,29(7):1011-1019. 被引量:108
  • 2M. P. Papazoglou.Service-oriented computing.Communications of the ACM.2003,46(10):25 - 28.
  • 3Ji Zhang and Betty H. C. Cheng. Model-based development of dynamically adaptive software. IEEE International Conference on Software Engineering (ICSE06).2006.5.
  • 4OSOA.Power Combination: SCA, OSGi and Spring Whitepaper [M].http://www.osoa.org,2007.3.
  • 5Zhang Jiajie.Research of the Service Design Approach Based on SCAOSGi.2009 IITA International Conference on Services Science, Management and Engineering.2009, p392-395.
  • 6Sandhu R,Coyne E J,Feinstein H L,et al.Role-based Access Control Models[J].IEEE Computer,1996,29 (2):38-47.
  • 7Ferraio lo D F,Sandhu R.Proposed NIST standard for role -based access control[J].ACM Transactions on Information and System Security,2001,4 (3):224-274.
  • 8Moyer M J,Abamad M.Generalized Role-Based Access Control[C].Proceedings of 21st International Conference on Distributed Computing Systems,2001:391 -398.
  • 9Joshij B D,Bertino E,Latif U,et al.A Generalized Temporal Role-Based Access Control Model[J].IEEE Trans.on Knowledge and Data Engineering,2005,17 (1):4-23.
  • 10曹晓叶,王知衍,许晓伟,梁英宏.基于SOA的企业应用集成研究与应用[J].微计算机信息,2007,23(36):16-18. 被引量:26

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部