Font Size: a A A

A Study And Application Of Role-based Access Control

Posted on:2005-02-10Degree:MasterType:Thesis
Country:ChinaCandidate:W LiuFull Text:PDF
GTID:2168360152470407Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
This thesis introduces three kinds of access control strategies: mandatory access control, discretionary access control and role-Based access control. Based on the further research of role-based access control, a method that regards the role as an object is very convenient and makes the system's authority limitation management easier, at the same time it improves the safety of system when the user's authority limitation needs to be modified with the change of organ structure, transfer of personnel and position. So comparing with the traditional technology of access control, the advantage of this method is more practical. Finally, combining to our software management system, the method and process of realizing role-based access control will be illustrated in this passage, including the database structure, software design process and interface design, etc.
Keywords/Search Tags:mandatory access control, discretionary access control, role, role-based access control, role hierarchy, constrained
PDF Full Text Request
Related items