Font Size: a A A

RBAC Model Researchapplication Based On JAVA EE And Clustering Technology Implementation In Virtual Digital City

Posted on:2012-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:N JiangFull Text:PDF
GTID:2178330338954768Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Access control is a syetem security technology which achieves established information security policies. In the system, if the case that legitimate users use the resources illegally or illegal users invade the system resources appeared, access control policies can control them effectively. In the trusted computer evaluation criteria, access control has become an important indicator of evaluating whether the system is safe, and it has a great significance on improving the security of computer system. The traditional access control has two types: Discretionary Access Control and Mandatory Access Control. With the research ascended, scholars have proposed a new type of access control policy which is called role-based access control.RBAC model theory principle is used as starting point in this paper, and combining the current popular J2EE development technology, using the development of Wuxi PPCC digital platform project as background. RBAC model is applied to the permission magament module of the specific application system. At the same time, by researching fuzzy theory, we introduce it into RBAC model. In addition, we also research the fuzzy clustering technology, and apply it into the user group experiment of RBAC model. The research work and achievenents in this paper mainly include followings:(1) This paper systematically describes the domestic and foreign research status on access control, and expounds the necessity,feasibility,superiority of researching access control. It introduces the basic situation of traditional access control model, and analysises the new type of role-based access control model (RBAC) detailedly.(2) In the paper, it introduces the current popular J2EE development technology, and analysises the structure function and implement principle of the open-resource framework(Struts,Spring,Hibernate) detailedly.(3) We apply the RBAC model to the permission magament module of Wuxi PPCC digital platform project, and the corresponding technical plan is given.(4) We introduce the fuzzy theory into RBAC model, and propose the RBAC model based the fuzzy theory. We validate the practicability of the model through experiment. (5) By researching several fuzzy clustering algorithms, we propose a mercer-kernel basemixed c-means fuzzy clustering algorithm with optimized Kernel parameters. In the paper, theoretical elaboration and specific implement of algorithm is given. We also clarify the influence from exception points and noise points to clustering center, and how to weaken the influence from exception points and noise points to offset of clustering center by adjusting fuzzy level control coefficient. In the process of clustering, we select optimized kernel parameter by using gradient descent method, which can make KFM algorithm obtain better clustering center. In addition, we apply this algorithm into the user group experiment of RBAC model and validate the practicability of the algorithm.
Keywords/Search Tags:Access Control, RBAC, J2EE, fuzzy theory, cluster
PDF Full Text Request
Related items