Font Size: a A A

The Design And Realization On The Security Management Of Distributed Database System

Posted on:2003-06-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y S TanFull Text:PDF
GTID:2168360065464247Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The development of network technology and database technology has greatly improved the wide application of distributed database system. Security management is one of the important aspects of a database application system. Regarding the practical system,a security management system of a distributed database system is designed and implemented in the thesis. A method for implementing privileged management in security management based on role-based access control model (RBAC) is proposed in order to implement security management in the database application system.In the thesis,the main idea to implement security management is to create the user's security information space (U-SIP) and the security information space for the database management system (D-SIP) separately. The rule and the method are given for implementing the mapping from the former onto the latter. The system is composed of security information database,security managing module and privilege verifying module. Firstly,it can process five types of authorization (roles to users,functional modules to roles,module-partitions to roles,database objects to functional modules,database objects to roles);Secondly,it provides several access control mechanisms (only one entrance,user authentication,menu level control,functional module level control,module partition level control,etc.)Besides,the structure of the system for implementing the security management system in the client/server environment is also presented. The adoptability,ease usability and maintainability are primary characters of the method. The system also has properties of simple authorization and sound granularity control under the distributed environment.
Keywords/Search Tags:Distributed database, Security management, access control, Role, Authorization, mapping
PDF Full Text Request
Related items