Font Size: a A A

Study And Realization On Access Control Of Application

Posted on:2005-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:W ShenFull Text:PDF
GTID:2168360152965542Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Information Security System is an immunity system of information system,which ensures security,usability,integrality and consistency of information system..On constitute Information Security System makes up of security organization,security technology, security management and so on. On structure Information Security System makes up of network security,system security,application security,data security and so on. Application and data security make up of authentication,access control,security audit,data security,data integrality,data consistency and so on. This paper makesa deep research on access control and atom structure of application.Firstly, this paper analyzes the characteristic of access control of application, and the characteristic of application, brings forward the collectivity scheme of access control of application. Aiming at the collectivity scheme, this paper put up the system structure design of database, and analyzes the function, input and output , working flow of every function module in detail.Then,this paper deeply studies the key technology of access control of application:ACL(Access?Control?Lists),function unit,etc. After analyzing the arithmetic of ACL(Access?Control?Lists), brings forward arithmetic of ACM(Access?Control?Matrix). After analyzing characteristic of application, brings forward scheme of atom structure of application.The product developed on the basis of some achievements in this paper is extended and applied in dozens of application. And the applications have got content result in improving efficiency of progaming,stability of software, flexibility of software and reducing cost of software.
Keywords/Search Tags:Information Security System, Access Control, Access Control Matrix, Atomic Operation, Object Permission Management
PDF Full Text Request
Related items