Font Size: a A A

Research And Implementation Of Access-control Technology In PDM

Posted on:2006-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:W L GuanFull Text:PDF
GTID:2178360182469325Subject:Mechanical design and theory
Abstract/Summary:PDF Full Text Request
PDM (product data management) is an integrated technology to manage product-related datum and processes. How to ensure datum's safety is an important research task in study and application of PDM when legal users of PDM are working in the same integrated circumstance. Studying access-control in PDM is an emphasis part to solve the problem. The research about only access-control is much deep, and there are some achievements in that field. But there are a lot of problems to solve in the study about access-control in PDM. By analyzing the needs of PDM to access-control and the shortage in traditional access-control, a new access-control model in PDM is proposed in this thesis based on research about product's whole lifecycle data management in CAD center of HUST. Firstly, by reviewing the developing history of PDM briefly in this thesis, the research about access-control is very important in PDM. In succession, the research actuality and related theory about access-control are probed, and three representative access-control models'realizable mechanism, including DAC, MAC and RBAC, are analyzed and evaluated in this paper. Secondly, by analyzing the needs of PDM to access-control and the related object about access-control in PDM, two conception, functionality privilege and entity privilege, are put forward. Based on them, an access-control model in PDM is constructed. The model makes access-control function in PDM strong and effective by applying related access-control theory and synthesizing traditional access-control's virtues mentioned above. Then, that the research in this paper locates in whole safety system of PDM is expounded, and the model's implemental mechanism proposed in this thesis is analyzed deeply from core arithmetic angle, and a feasible settlement is provided. Finally, from the practical angle, the results achieved in this paper are applied to access-control module in PDM system of JAC according to practical needs of JAC. The effect is perfect.
Keywords/Search Tags:PDM, Access-control, Privilege Management, Role
PDF Full Text Request
Related items