期刊文献+

前后端分离Web系统下一种访问控制方法的设计与实现 被引量:4

Design and implementation of access control method for Web system with frontend-backend separation
下载PDF
导出
摘要 为了在不降低系统性能的前提下,提升前后端分离Web系统内访问控制模块的开发效率,介绍了一种以基于角色的访问控制为核心思想,通过解析特定格式的API访问地址来调用不同的Spring MVC拦截器以决定控制策略的访问控制模块开发方法。该方法实现了在前后端分离Web系统开发过程中,业务逻辑与访问控制分离,使开发者在扩展与维护系统访问控制模块时能够通过修改所涉及到功能的API访问地址使其变得更加轻松与便捷。 In order to improve the development efficiency of access control module of Web system with frontend-backend separation, without degrading the system performance, this paper introduces an access control module development method which takes Role-Based Access Control(RBAC) as the main part and calls different spring MVC interceptors to determine the control strategy by parsing the API access address in specific format. In the development process of web system with frontend-backend separation, the business logic is separated from the access control, so that the developer can modify the function-related API access address when extending and maintaining the system access control module, make it easier and more convenient.
作者 宋清卿 Song Qingqing(Nanjing Institute of Industry Technology,Nanjing,Jiangsu 210046,China)
出处 《计算机时代》 2020年第5期23-26,共4页 Computer Era
关键词 前后端分离 基于角色的访问控制 SPRING MVC拦截器 开发效率 frontend-backend separation Role-Based Access Control Spring MVC interceptor development efficiency
  • 相关文献

参考文献5

二级参考文献32

  • 1陈劲.访问控制技术的研究[J].福建电脑,2005,21(3):11-12. 被引量:2
  • 2龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,42(5):868-876. 被引量:26
  • 3徐伟,魏峻,李京.面向服务的工作流访问控制模型研究[J].计算机研究与发展,2005,42(8):1369-1375. 被引量:16
  • 4鲍连承,赵景波.访问控制技术综述[J].电气传动自动化,2006,28(4):1-5. 被引量:7
  • 5Sandhu R,Ferraiolo D,Kuhn R.The NIST Model for Role-Based Access Control:Towards a Unified Standard[DB/OL].http://csrc.nist.gov/rbac/sandhu-ferraiolo-kuhn-00.pdf,2000-08-08.
  • 6Ferraiolo D,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control [J].ACM Trans.on Information and System Security (TISSEC),2001,4(3):224-274.
  • 7Li Ning-hui,Byun Ji-Won,Bertino Elisa.A critique of the ANSI standard on role-based access control [J].IEEE Security & Privacy,2007,5(6):41-49.
  • 8Ferraiolo D,Kuhn R,Sandhu R.RBAC standard rationale:Comments on “A critique of the ANSI standard on role-based access control”[J].IEEE Security & Privacy,2007,5(6):51-53.
  • 9Alan H Karp,Harry Haury,Michael H Davis.From ABAC to ZBAC:the Evolution of Access Control Models [R].Tech Report HPL-2009-30,HP Labs,2009.
  • 10Kuhn R,Coyne E,Weil T.Adding attributes to role-based access control [J].IEEE Computer,2010,43(6):79-81.

共引文献56

同被引文献17

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部