Font Size: a A A

Research And Application Of Access Control In PDM System

Posted on:2007-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:J JiangFull Text:PDF
GTID:2178360185987030Subject:Mechanical Manufacturing and Automation
Abstract/Summary:PDF Full Text Request
Today, networked manufacturing system is becoming a new paradigm for manufacturing industry. It is an open, heterogeneous, cooperation-supported, agile system through network. All design and manufacturing data of the enterprise need to store, send, receive, integrate and reproduce in the system in which a great deal of information demand secrecy. So information security of the system is the precondition for applying product data management system. Based on PDM system, this paper studies the access control technique, which is one of the key techniques that ensure information security, and then realize it in PDM system development.In view of product data management, by analyzing complex characteristics of networked manufacturing and its special demands for information security, brings forward the corresponding access control strategy, as well as the system access control framework. Through introducing correlative theory of access control, especially theory of RBAC, analyzes and discusses RBAC model and its managing mode. At the same time, this paper studies access control technology by taking enterprise application circumstance as typical distributed one, realizes user management and privilege management, divides the roles into three levels by adopting multilayer role control, and lays an emphasis on discussion about assigning relations between users and roles. In view of users, divides the users into different project team according to department job, which is more suitable for practical user management in enterprise. By constructing application component on Web server, extracts information such as role assignment, role inheriting, privilege distribution and dynamic constraints from database relation tables, then according to user roles and dynamic constraint rules,...
Keywords/Search Tags:Access Control, Networked Manufacturing, Role, Privilege, Hierarchical Relations, Product Data Management
PDF Full Text Request
Related items