期刊文献+

云平台下CRM系统访问控制研究与设计 被引量:1

Research and Design of Access Control of CRM System Deployed in Cloud Platform
原文传递
导出
摘要 文章对比分析了主流的访问控制模型,以基于角色的访问控制模型为基础,设计了适合云平台下CRM系统的访问控制机制,该机制增加了用户组、部门、资源、操作等实体。在优先通过角色授权的基础上,允许对用户直接授权,在权限设计中增加了用户权限直接授权,用户角色权限的动态授权等。本文还介绍了云平台下CRM系统的访问流程,并实现了云平台下CRM系统的访问控制。 In this paper, the main access control models are analyzed and compared, and a access control mechanism suitable for the CRM system deployed in cloud platform is designed on the basis of role-based access control model. In this design the entities of user group, department, resource and operation are added, which authorize users through assigning users roles preferentially, and on this basis, allowing the existence of authorizing users directly. And the direct binding of users and permissions, and dynamic binding of users, roles and permissions are added. The access process of CRM system deployed in cloud platform is also introduced and implemented in this paper.
出处 《电子技术(上海)》 2014年第6期4-8,共5页 Electronic Technology
关键词 云平台 CRM系统 访问控制 Thrift框架 cloud platform CRM system access control Thrift framework
  • 相关文献

参考文献5

二级参考文献55

  • 1赵玉霞.基于SaaS模式下的系统数据安全策略研究[J].软件导刊,2010,9(1):143-144. 被引量:5
  • 2张学敏,熊曾刚,陈建新,刘洪星.基于MIS系统的用户动态权限管理[J].计算机工程,2005,31(6):231-232. 被引量:10
  • 3沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:87
  • 4韩若飞,汪厚祥.基于任务-角色的访问控制模型研究[J].计算机工程与设计,2007,28(4):800-802. 被引量:33
  • 5Fcrraiolo D F,Barkley J F,Kubn D R.A role based access con- trol model and reference implementation within a corporate in- tranet[J].ACM Transactions on Information Systems Security, 1999, 2 ( 1 ) : 34-64.
  • 6Sandhu, R, Samarati P.Access control:principles and practice[J].IEEE Commun, 1994,32(9) :40-48.
  • 7Nyanchama M, Osbom S.Modeling mandatory access control in role-based security systems[C]//Proeeedings of the 9th Annual IFIP TC11 WG11.3 Working Conference on Database Security IX: Status and Prospects, RensselaerviUe, New York, United States, 1996:129-144.
  • 8Ferraiolo D F,Ktthn D R.Role based access control[C]//15th National Computer Security Conference, 1992: 554-563.
  • 9Sandhu R S,Coyne E J.Role-based access control models[J].Compurer, 1996,29(2) :38-47.
  • 10Alto G J, Sandhu R.Role-based authorization constraints specification[J].ACM Transactions on Information and System Security, 2000,3 (4) : 207-226.

共引文献63

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部