Font Size: a A A

Research On Access Control Technology For Enterprise Application Software And Implementation

Posted on:2005-10-14Degree:MasterType:Thesis
Country:ChinaCandidate:D W XieFull Text:PDF
GTID:2168360152968097Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
Information Security has become more and more important in modern enterprises. The most important thing that assures the information secure is to keep the unauthorized users from enterprise-level application systems. This job is done by access control mechanism. The research on access control models and software implementation is of great academic and practical significance. First, this paper introduces the functions of access control systems in enterprise applications. Several mainstream access control models are described, includes the disadvantages of these models when they used to express the access control demands in enterprise. The problems in the design and implementation of access control systems are also discussed. As a solution, policy-based access control (PBAC) model is proposed to be the foundation of the research.This paper introduces the concept of PBAC. Considering the characters of component-based software development, an implementation framework of PBAC is also given, which can help to realize the fine-granular access control. The methods of describing access control rules and policies under this frame- work are also given.To help the enterprises identify their access control demands with PBAC policies and rules, this paper also makes a research on access control design methodology and proposes an UML-based design method. In the second part of this paper, we research into the realization of access control and propose a JMX-based access control platform. This platform can turn the access control policies into program codes, thus make the applications which are based on it achieve the function of fine-granular access control rapidly. This paper describes the framework and realization modules of the platform in detail and how the platform is integrated with enterprise-level application systems in different scenarios is also discussed. To make the platform run more efficiently, we also make a research on component management. In the end, we introduce a case in which the access control platform has been successfully implemented in large project management software.
Keywords/Search Tags:information security, access control, component-based software development, component management
PDF Full Text Request
Related items