期刊文献+

基于Shiro的某高校科研信息管理系统的设计与实现 被引量:3

Design and implementation of scientific research information management system of a university based on Shiro
下载PDF
导出
摘要 高校科研信息管理系统主要提供高校对科研成果的录入、材料的初核、成果的评定、查询统计与汇总等各类处理。本文介绍了Shiro框架的主要功能特征,并基于Shiro应用框架对现有的高校科研信息管理系统实现系统集成,提供系统所需要的用户、角色、资源管理。为科研管理实现细粒度的访问控制,为科研信息安全提供保障,满足了高校对科研信息管理的需求。 Scientific research information management system in universities mainly provides the following designs as the input of scientific research achievements, the initial evaluation of materials, the evaluation of achievements, the inquiry, statistics and summarization. This paper introduces the main functions and characteristics of the Shiro framework, and implements the system integration of the existing university research information management system based on the Shiro application framework, providing the users, roles and resource management needed by the system. The research could achieve fine-grained access control for scientific research management, provide the guarantee for scientific research information security, and satisfy the management needs of university scientific research information.
作者 宋成明
出处 《智能计算机与应用》 2017年第4期62-63,66,共3页 Intelligent Computer and Applications
基金 山西省教育科学"十三五"规划课题(GH-16187) 山西大学商务学院科研计划项目(2016007 2016008)
关键词 访问控制 科研 Shiro 认证 access control scientific research Shiro authentication
  • 相关文献

参考文献5

二级参考文献24

  • 1杨强,王忠民.ERP系统用户权限分配问题的实现[J].微机发展,2004,14(7):16-17. 被引量:9
  • 2朱磊,周明辉,刘天成,梅宏.一种面向服务的权限管理模型[J].计算机学报,2005,28(4):677-685. 被引量:29
  • 3周文峰,尤军考,何基香.基于RBAC模型的权限管理系统设计与实现[J].微计算机信息,2006(05X):35-36. 被引量:25
  • 4OSBORN S, SANDHU R. Configuring role-based access control to enforce mandatory and discretionary access control policies[ J]. ACM Transactions on Information and System Security, 2000, 3(2) : 123 - 132.
  • 5LIN A, BROWN R. The application of Security policy to rose-based access control and the common data security architecture[ J]. Computer Communication, 2000, 23(17) : 1584 - 1593.
  • 6Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based Access Control Models[J]. IEEE Computer, 1996, 29(2): 38-47.
  • 7Epstein P, Sandhu R. Towards A UML Based Approach to Role Engineering[C]//Proceedings of the 4th ACM Workshop on Role-based Access Control. [S. l.]: AVM Press, 1999-10: 28-29.
  • 8Les Hazlewood. Application Security With Apache Shiro [EB/OL].http://www.infoq.com/articles/apache-shiro.
  • 9Apache Shiro. Understand Permissions in Apache Shiro [EB/OL]. http://shiro.apache.org/permissions.html.
  • 10郭超,陆璇.新疆林科院科研管理信息化平台详细设计说明书[R].2013:16-19.

共引文献101

同被引文献24

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部