期刊文献+

支持SaaS的安全权限管理系统 被引量:2

A SaaS-supported access control system
下载PDF
导出
摘要 SaaS作为一种通过互联网向公众特别是中小企业提供应用软件的模式,其突出特点就是可扩展性、多用户、高效性、可配置性。文章基于SaaS第四级成熟度"可扩展的多实例可配置级"要求,设计和实现了一个可以支持多租户、多服务的SaaS系统架构和一个统一的安全认证与权限管理系统。其中所采用的存储模型和安全管理模型可适应于大规模租户的需要,可在满足系统性能要求下的架构灵活性和可扩展性,并满足多租户的定制化需求。 SaaS is a new software service mode for Interact users especially enterprises of small and medium size. It has the characteristics of flexibility, multi-tenant, high performance and configurability. Based on the demand of SaaS fourth Maturity Model, the author of this article has designed and implemented a new kind of security authentication and access control system which supports multi-tenant and multi-service. Their storage mode and security management mode can match the demand of the large scale tenants, the structure flexibility and customized requests.
出处 《计算机时代》 2012年第4期1-3,共3页 Computer Era
基金 电子信息产业发展基金(2009070801:)
关键词 SAAS 安全权限管理 多服务 多租户 SaaS access control system multi-service multi-tenant
  • 相关文献

参考文献6

二级参考文献37

  • 1程玉松,孟丽荣,盛琦,刘学波,柳楠.利用规则RBAC模型实现门户的安全访问控制[J].计算机工程与设计,2005,26(5):1299-1301. 被引量:11
  • 2李卿,乔元松,郑慧.角色分离的层次化RBAC模型[J].计算机工程与设计,2005,26(6):1563-1565. 被引量:7
  • 3杨赞国,高敬惠.基于C/S模式的网络信息管理系统设计与实现[J].微计算机信息,2005,21(07X):27-29. 被引量:37
  • 4李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 5D Ferraiolo, J Cugini, D R Kuhn. Role based access control:Features and motivations. In: Proc of the llth Annual Computer Security Applications Conf. Los Alamitos, CA: IEEE Computer Society Press, 1995.
  • 6D Ferraiolo, J Barkley, D R Kuhn. A role-based access control model and reference implementation within a corporate Intranet ACM Trans on Information and System Security, 1999, 2( 1 ) : 34-64.
  • 7R Sandhu, E Coyne, H Feinstein et al. Role-based access control models. IEEE Computers, 1996, 29(2) : 38-47.
  • 8D Ferraiolo, R Sandhu, D R Kuhn et al. Proposed NIST standard for role-based access control. ACM Trans on Information and System Security, 2001, 4(3): 224-274.
  • 9G Ahn, R Sandhu. Role-based authorization constraints specification. ACM Trans on Information and System Security,2000, 3(4): 207-226.
  • 10P Iglio, L Giuri. A formal model for role-based access control with constraints. In: Proc of the 9th IEEE Workshop on Computer Security Foundations. Los Alamitos, CA: IEEE Press, 1996.136- 145.

共引文献158

同被引文献5

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部