Font Size: a A A

Research And Application Of Permission Management Fine Granularity RBAC Model In PDM

Posted on:2012-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:F TengFull Text:PDF
GTID:2178330335950306Subject:Software engineering
Abstract/Summary:PDF Full Text Request
This article is based on the requirements of management and security in PDM system. After extensive study in the present PDM system and access control management, this article propose a new model which is improved on the present RBAC model to use in PDM systems. The improved model based on RBAC model has been developed which use Windows operating system as application platform, OraclelOg as database system, C # 2.0 as the programming language.At first, this article describes the generation of PDM systems and the trends of improvement in PDM system, and summarizes the deficiencies of current status of PDM system and the features of the permissions management in PDM system. This article clarify the importance of management systems. On the basis of this study proposed the purpose and the main content.Secondly, the article describes the development process of the access control model, and the analysis and study focus on a typical access control technology, This article proposed the comparison of these access control technologies and comparison of these technologies use in the PDM system.This article propose that the permission in PDM system s suitable for use role-based access control technology, and introduced the role-based access technology development process.This article focuses on the permission management model improved on RBAC which is suit to the features of the permission management in PDM system. This article proposed a model of permission management in PDM system. The model proposed some concepts such as the permission state, data permission and functional permission, so that achieve fine-grained management of permissions management and make recycling of permission more convenient and flexible; The mode add constraints on the role hierarchy, so the model can effectively avoid the generation of cyclic succession; The model divide the resource object in detail in order to achieve a safe, flexible and efficient permission management. This paper describes the improved model in the framework of the application of PDM system design, detailed design and definition of the concept in detail; the article propose the two ways to manage the uses separately or in group to make the authority more simple; and this paper propose the calculation method on role and user permissions, and gives the conflict resolution when the system grant permission; this article describes in detail the relationship between database tables and the corresponding database table design; and the process of permission management. Finally, this paper use the way of combination of theory and practice of organic to style. This article base on the PDM system which is used in Changchun Chaowei Technology Industry Company for the background, the application results of this study developed a complete PDM rights management module. And in Chapter V of this paper focuses on the main function of the module interface of the implementation of rights management permission in PDM system. After the actual use, shows that the model is authorized in the permission management convenience, more flexible in recovery permission, and enhance the security of the system, and the model can meet the actual requirements.
Keywords/Search Tags:PDM, RBAC, Permission Management, Role, Permission State
PDF Full Text Request
Related items