Font Size: a A A

Application Of Role-based Access Control In Enterprise's E-business

Posted on:2007-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:G J LiFull Text:PDF
GTID:2178360212499467Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
With the development of Enterprise's E-business systems,people look more important upon the security of system gradually. Access control technology is the important factor of solving security problems. At present most of Enterprise's E-business systems adopt traditional methods including Discretionary Access Control(DAC) and Mandatory Access Control (MAC),which have some deficiencies.This paper theoretically and practically studies Role-based Access Control(RBAC) in Enterprise's E-business systems.Compared with traditional DAC and MAC models, Role-Based Access Control(RBAC) Model can provide better flexibility and scalability, and is nowdays the best and most popular access control model.It is well suited for distributed application.In this thesis. First,we introduced the background, generation, current status, applications and advantages of RBAC model.and then analyze RBAC model,compare it with traditional access control scheme,and discusse the characters and security requirements of Enterprise E-business systems , Specifically expound the course of analyzing,designing and implementing RBAC scheme in Enterprise E-business systems.point out the deficiency of using RBAC model in Enterprise E-business systems. Finially,with a example,we design the scheme of RBAC implement,which includes dividing roles,assigning permissions.
Keywords/Search Tags:Access control, RBAC, Role, E-business, Network security
PDF Full Text Request
Related items