Font Size: a A A

The Research And Implement Of Role-Based Access Control Model In OA Based On B/S Structure

Posted on:2007-08-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y DaiFull Text:PDF
GTID:2178360182982292Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of information technology and the expedite step of our country's information progress, it is necessary for whether a government or business enterprise to realize office automation to improve the work efficiency and fasten information transmit speed. OA (Office Automaiton) is the new office way that is combined with the function of modern office and network. The employees could be stride over the time and space limits and realize cooperative work.Because of standard, opening and distributed characteristics of Internet, the develop pattern of office information system is changed from C/S (Client/Server) structure to B/S structure with 3-tier (Brower/Web Server/DB Server). In B/S mode clients only need operating system and browser, and the server can complete all the developments and maintenances of the applications.With the widely using and development of Enterprise Office Information Systems, people look more important upon the security of system gradually. Access control technology is the key factor of solving security problems. At present most of Enterprise Information Systems adopt traditional methods including Discretionary Access Control (DAC) and Mandatory Access Control (MAC), which have some deficiencies. This paper theoretically and practically studies Role-based Access Control (RBAC) in Enterprise Information Systems.The author analyzed RBAC concept model, compares it with traditional access control scheme, and demonstrated the advantages and uses of implement RBAC in Enterprise Information Systems.And then discussed the common RBAC model, the extended RBAC model and the RBAC in Web. According the RBAC/Web model, designed the scheme of RBAC implement, which includes dividing roles, assigning permissions and RBAC administration.Summarized the specialties and advantages of RBAC in Enterprise Information Systems. Finally, took examples of "Office Information System for Road Managing Ministry in Huangshi City", and specifically expound the course of analyzing, designing and implementing RBAC scheme in Enterprise Information System. It also demonstrated that the scheme is feasible in Enterprise Information Systems.
Keywords/Search Tags:Office Automation System, Access Control, Role, Security
PDF Full Text Request
Related items