This thesis introduces three kinds of access control strategies: mandatory access control, discretionary access control and role-Based access control. Based on the further research of role-based access control, a method that regards the role as an object is very convenient and makes the system's authority limitation management easier, at the same time it improves the safety of system when the user's authority limitation needs to be modified with the change of organ structure, transfer of personnel and position. So comparing with the traditional technology of access control, the advantage of this method is more practical. Finally, combining to our software management system, the method and process of realizing role-based access control will be illustrated in this passage, including the database structure, software design process and interface design, etc.
|