Font Size: a A A

Design And Implementation Of A Mechanism For C/S Information System Access Control

Posted on:2006-08-30Degree:MasterType:Thesis
Country:ChinaCandidate:H Y WangFull Text:PDF
GTID:2178360185992507Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development and popularity of the computer network, the security problem of the information system is becoming more and more prominent day by day. The information system security is closely related to its database system security. Although all the commonly used database management systems support certain information system safeguarding, they still have to provide the safety management mechanism that meets the users' needs and at the same time can be flexibly set by the user. The access control is just such a kind of management control mechanism.The access control mechanism is one kind of system security technology which implements the decided security strategies. It can effectively prevent the illegal users visiting the system resources and the legal users using the resources illegally It manages all resource access requests, in other words, it makes the judgment whether or not permitting the accessing instruction on each resource according to the security strategy requirements. Some access control mechanisms such as DAC, MAC, RBAC and TBAC have been developed with the unceasingly development of the access control technology. Among them, RBAC is one kind of access control mechanism based on role, and it classifies some roles according to the security strategies, assigns operation permission to each role. The RBAC solves the authorized management problems of the systems, which have massive users, data objects and all kinds of access jurisdictions.The STDA-RBAC has basically solved the authorized management problem of "Golden Journey Project" of Shandong Province, which has massive users, data objects and all kinds of access jurisdictions. If the STDA-RBAC is improved in the aspect of function atomization and module component, it can hopefully become an independent software product.
Keywords/Search Tags:Information System, Access Control, Role, User, "Golden Journey Project"
PDF Full Text Request
Related items