期刊文献+

基于ASP.NET技术及三层网络架构的权限管理系统模型 被引量:51

Authorization Management System Model Based on 3-Tier Architecture and ASP.NET
下载PDF
导出
摘要 提出一种基于ASP.NET技术及3层网络架构的权限管理系统模型。该系统基于.NET框架,采用了表现层、中间层和数据层的3层设计架构,利用了ASP.NET在安全性方面的特性,极大地提高了系统的可移植性、可扩充性和可维护性。 A whole architecture of authorization management system model based on 3-tier architecture is presented in this paper.The system based on .NET framework makes full use of the security properties of ASP.NET and adopts the three-tier architecture: presentation, middle and data tiers, which efficiently improves the transplantation, the extension and the maintenance.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第12期101-102,178,共3页 Computer Engineering
关键词 ASP.NET 角色 访问控制 ASP.NET Role Access control
  • 相关文献

参考文献5

二级参考文献15

  • 1[1]Tim Bray (Textuality and Netscape), Jean Paoli (Microsoft), C.M.Sper berg-McQ ueen (University of Illinois at Chicago), Extensible Markup Language (XML) 1.0, W3C Recommendation 10-February-1998[DB/OL].http://www.w3.org/TR/REC-xml
  • 2[2]The White Page of Transaction Server, Transaction Server -- Transa ctional Co mponent Services, A Guide to Reviewing Microsoft Transaction Server Release 2.0 -- The Best Technology for Developing and Deploying Applications on Windows NT , December 1997[DB/OL]. http://www.microsoft.com/com
  • 3[3]Ralf Steinmetz, Klara Nahrstedt. Multimedia: computing, communicatio ns and applications[M], Prentice Hall, Inc., 1995
  • 4[4]R.J.Glushko, J. M. Tenensaum, and B. Meltzer. An XML FRAMEWORK for a gent-based e-commerce[J], Communications of ACM. March, 1999 42(3)
  • 5[5]Khars R, Rifkin A., XML: A Door to automated Web applications[J]. IEEE Internet Computer. Aug.1997
  • 61,Ferraiolo D F, Kuhn R. Role-Based access control. In: Proceedings of the 15th National Computer Security Conference. Baltimore, MD, 1992. 554~563, http://hissa.ncsl.nist.gov/kuhn/
  • 72,Sandhu R, Samarati P. Access control: principles and practice. IEEE Communications, 1994,32(9):40~48
  • 83,Ramaswamy C, Sandhu R. Role-Based access control features in commercial database management systems. In: Proceedings of the 21st National Information Systems Security Conference. Virginia: U.S. Government Printing Office, 1998, http://www.list.gmu.edu/conferen.htm
  • 94,Sandhu R, Coyne E J, Feinstein H L et al. Role-Based access control models. IEEE Computers, 1996,29(2):38~47
  • 105 Sandhu R. Rationale for the RBAC96 family of access control models. In: Proceedings of the 1st ACM Workshop on Role-Based Access Control. ACM, 1997. http://www.list.gmu.edu/conferen.htm

共引文献183

同被引文献244

引证文献51

二级引证文献122

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部