期刊文献+

脱耦权限组件模型研究 被引量:1

Decoupled privilege component modeling
下载PDF
导出
摘要 权限管理是现代信息系统设计的核心内容之一,降低权限管理实现与宿主系统的耦合、提高权限系统的复用能力,对信息系统降低研发成本、增强系统健壮性有着重要意义.本文从信息系统解耦相关概念出发,分析脱耦组件的需求模式,提出了一套基于消息服务及RBAC技术的脱耦权限组件设计结构并予以实现.该组件具有独立的权限管理设计模式,并借助消息服务达到了易部署的目的,一定程度上拓宽了权限管理的设计模式. Privileges management is one of the core contents of modern information system design,It's important to decrease the cost of research and development and strengthen information system robustness by reducing the coupling between privileges management and host system and improving the reuse ability of privileges system.In this paper,we defined the related concept of decoupling at the first,and base of analyzing the decoupling component requirements,we presented a design structure based on MOM(message oriented middleware)and RBAC and implemented it.This component implement had independent host application,and with the help of MOM to achieve the purpose of easy deployment at a certain extent widening the design mode of privileges management.
作者 王思乐
出处 《河北大学学报(自然科学版)》 CAS 北大核心 2015年第4期405-410,共6页 Journal of Hebei University(Natural Science Edition)
基金 国家国际科技合作专项项目(2013DFA11320) 河北省自然科学基金资助项目(F2015201033)
关键词 脱耦 权限管理 消息服务 组件 decoupled privileges management MOM(message oriented middleware) component
  • 相关文献

参考文献8

  • 1王建岭,李仁玲,王恒草,王铁柱.Web服务的多层入侵容忍机制[J].河北大学学报(自然科学版),2012,32(5):545-549. 被引量:1
  • 2RAN Jiang, WEN Zhigang ,FAN Chunxiao , et al. Privilege management for resources sharing web platform based on RBAC model [Z]. 3rd IEEE international conference on broadband network and multimedia technology , Beijing, 2010.
  • 3LI Jin. Design and implementation for universal privilege management infrastructure [J]. Applied Mechanics and Materi- als, 2013,241 - 244: 3125 - 3129.
  • 4ROMdN I, CALVILLO J, RIVAS S, et al. Privilege management infrastructure /or virtual organizations in healthcare grids [J]. IEEE Transactions on Information Technology in Biomedicine, 2011,15(2) : 316 - 323.
  • 5ROHRER F, ZHANG Y T, CHITKUSHEV L, et al. DR BACA : Dynamic role based access control for android [Z]. 29th Annual Computer Security Applications Conference, New Orleans, 2013.
  • 6LANG U , SCHREINER R. Implementing least privilege for interconnected, agile SOAs/elouds [C]//REIMER H, POHLMAN N, SCHNEIDER W. ISSE 2012 Securing Electronic Business Processes: Highlights of the Information Se- curity Solutions Europe 2012 Conference, Wiesbaden: Vieweg+Teubner Verlag, 2012:89 - 102.
  • 7SOUTO E, GERMANO G,GLAUCO V, et al. A message-oriented middleware for sensor networks [Z]. Proceedings of the 2^nd Workshop on Middlewarc for Pervasive and Ad-hoc Computing, New York,2004.
  • 8SANDHU R, COYNE E J, FEINSTEIN , et al . Role-based access control models [J] . IEEE Computer, 1996,29(2): 38-47.

二级参考文献10

  • 1SAIDANE A,NICOMETTE V, DESWARTE Y. The design of a generic intrusion-tolerant architecture for Web servers [J]. Dependable and Secure Computing, 2009, 6(1) : 45 - 58.
  • 2VERiSSIMO P, NEVES N, CORREIA M. Intrusion-tolerant architectures: concepts and design[J]. Lecture Notes in Computer Science, 2003(2677) : 3 - 36.
  • 3ALYSSON N, PAULO S, MIGUE C. Cheap intrusion-tolerant protection for CRUTIAL things[R]. Lisbon: Department of Computer Science, University of Lisbon, 2009.
  • 4RAFAEL F, BRUNO G, JOAO S, et al. An intrusion-tolerant web server based on the DISTRACT architecture[EB/ OL]. (2004 - 08 - 24) [2011 - 06 - 20]http://www. di. fc, ul. pt/- nuno/PAPERS/WDDDMO4.
  • 5VERISSIMO P, NEVES N, CORREIA M. Intrusion-tolerant architectures: concepts and design architecting dependable systems [J].Lecture Notes in Computer Science, 2003(2677):3 -36.
  • 6VERISSIMO P, NEVES N F, CACHIN C, et al. Intrusion-tolerant middleware: the road to automatic security[J]. IEEE SECURITY & PRIVACY, 2006,4 : 54 - 62.
  • 7BANGALORE A, SOOD A. Securing web servers using self cteansingintrusion tolerance (SCIT) [EB/OL]. (2009 -03 - 30)[2010 -07 -05]. http://cs, gmu. edu/-asood/scit/depend_2009_submitted_version- 2.
  • 8NGUYEN Q, SOOD A. Comparative analysis of intrusion-tolerant system architectures[EB/OL]. (2010- 08- 24) [2011 - 06 - 20]. http://cs, gmu. edu/-asood/scit/SP - PrePrint.
  • 9SOUSA P, BESSANI A N, CORREIA M, et al. Highly available intrusion-tolerant services with proactive-reaetive re- covery[J/OL]. Parallel and Distributed Systems, 2010,21(4) : 452 - 465.
  • 10张云英,努尔布力,王程明,姜千,胡亮.入侵容忍综述[J].吉林大学学报(信息科学版),2009,27(4):389-395. 被引量:8

同被引文献6

  • 1HONKAVAARA E’SAARI H, KAIVOSOJA J, et al.Processing and assessment of spectrometric, stereoscopic imagerycollected using a lightweight UAV spectral camera for precision agriculture[J], Remote Sensing, 2013 ( 5 ) : 5006-5039.
  • 2XIANG H T,TIAN L. An automated stand-alone in-field remote sensing system (SIRSS) for in-season crop monitoring[J].Computers and Electronics in Agriculture,2011,78(1) : 1-8.
  • 3YU Z H,CAO Z G,WU X,et al.Automatic image-based detection technology for two critical growth stages of maize:E-mergence and three-leaf stage[J]. Agricultural and Forest Meteorology, 2013,174-175: 65-84.
  • 4DUVEILLER G,BARET F,DEFOURNY P.Remotely sensed green area index for winter wheat crop monitoring: 10-Yearassessment at regional scale over a fragmented landscape[J]. Agricultural and Forest Meteorology ,2012 ,166-167(2) : 156-168.
  • 5YANG C H. A high-resolution airborne four-camera imaging system for agricultural remote sensing[Jj.Computers and E-lectronics in Agriculture,2012 ,88 : 13-24.
  • 6MONTALVO M,GUERRERO J M,ROMEO J,et al.Automatic expert system for weeds/crops identification in imagesfrom maize fields[J],Expert Systems with Applications,2013,40(1) : 75-82.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部