期刊文献+

电厂MIS中用户权限管理的探讨与实现 被引量:2

Discussion and Realization of User Power Management in Equipment MIS of Electric Power Plant
下载PDF
导出
摘要 针对设备管理信息系统中提出的安全性管理的要求,借鉴数据库中角色管理的概念,提出了一种符合企业管理结构的基于应用层的权限管理方案,并对权限设置的原则和实现过程进行详细的论述。通过Delphi编程实现对用户权限的灵活配置,在一定程度上提高了系统的可维护性,同时也使整个系统的管理得到了优化。 Analyses the security of equipment management system,puts forward a scheme of user power management based on the application layer as reference of DBMS'privilege, and discusses the principles of privilege and the process of realization in detail. Using Delphi program tool carries out the flexible configuration of users'privileges.In some degreen this method enhances the maintainability,and also optimizes the management of the whole system.
作者 胡赛莲 周俊
出处 《微机发展》 2003年第8期51-54,共4页 Microcomputer Development
关键词 电厂 MIS 设备管理信息系统 用户权限管理 电力企业 企业信息化 equipment management system privilege role user
  • 相关文献

参考文献2

二级参考文献4

  • 1[1]Ravi S Sandhu, et al. Role-Based Access Control Models[J].Computer IEEE, 1996,29 (2): 38-47.
  • 2[2]Matthew J Moyer, Mustaque Ahamad. Generalized Role-Based Access Control [J]. Proceedings-International Conference on Distributed Computing Systems, 2001, (4): 391-398.
  • 3[3]Sandhu R S,et al. Role-Based Access Control: A Multi-dimensional View[J]. Annual Computer Security Applications Conference, 1994, (12) :54-62.
  • 4朱虹,冯玉才.MIS系统的授权管理[J].计算机工程与应用,1999,35(3):72-74. 被引量:9

共引文献121

同被引文献10

  • 1[1]Evangelos Kotsovinos and Tim Harris, Role - Based Resource Management 2003.
  • 2[2]Ravi S. Sandhu, Role- Based Access Control Models [ J].IEEE Computer, 1996,29, (2): 38 - 47.
  • 3[5]Burin Yenmunkong and ChanBoon Sathitwifiyawong, An Enhanced Access Control Model Using Constraint Fcatures[Z]. 2002.
  • 4[6]Along Lin Integrating Policy - Driven Role Based Access Control with the Common Data Security Architecture [ J].HP Laboratories Bristol 1999,4.
  • 5[7]Thomas Riechmann and Jurgen Kleinoder Meta Object for Access Control: Role- Based Principals [R]. ACISP981998.
  • 6Bacon J, Moody K, Yao W. A Model of OASIS Role - Based Access Control and Its Support for Active Security[J]. ACM Transaction on Information and System Security, 2002,5 (4):492 - 540.
  • 7Riechmann T, Kleinoder J. Meta Object for Access Control:A Formal Model for Role- Based Principals[ A]. Proceedings of 1998 ACM New Security Workshop [ C]. Charlottesville, Virginia: [s. n. ] ,1998.1 - 9.
  • 8Riechmann T, Hanck F. Meta Object for Access Control: Extending Capability- Based Security [ A]. Proceedings of ACM New Security Workshop[C]. GreatLangdale, UK: [s. n. ],1997.1 - 6.
  • 9Gopal B. Integrating Content - Based Access Mechanisms with Hierarchical File Systems[A]. Proceeding of the 3rd Symposium on Operation System Design and Implementation [ C].New Orleans,Louisiana: [s. n. ], 1999.1 - 14.
  • 10许春根,贡生.一种新型的基于角色访问控制的角色管理模型[J].计算机工程,2003,29(8):26-28. 被引量:10

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部