Font Size: a A A

Access Control Models Based On Repeated-Role And Task Priority

Posted on:2007-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:Z H JiangFull Text:PDF
GTID:2178360212957540Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Internet has been applied in every walk of life, with the development of computer technology and network. It has a profound effect on people's life style and management of enterprise, creating tremendous wealth for society. But people must deal with the challenge on network security, when enjoying convenience. Network that has no security is an air castle. Access control is to authorize user the access ability and the access scope by some means. For WEB application, access control has become the essential basic security technology on application layer. At the same time, it has become a challenging problem because of its complexity.Based on the safety requirement of network environment, the related access control has been researched in this dissertation. Firstly, the particularity and the importance of access control in network environment have been analyzed; the summary of basic access control theory and technology has also been discussed. Secondly, Role-Based Access Control and Task-Based Access Control have been researched, the comparison to each model has been carried on.Based on two models, Access Control models Based on Repeated-Role and Task Priority has been produced. The concepts of repeated-role and priority task have been introduced in this model. Repeated-role makes user have the same roles simultaneously and complete different tasks, so it makes system much agiler. At the same time, system allots a value for every role depending on its importance and enactments priority of task depending on its context, then users can choose the role that has the highest priority to perform, it enhances the value ratio and deadline guarantee ratio of system. Finally, based on research, the system is designed and developed. This system is used to manage and authorize users in unison. Each part of the system is independent, which guarantees the loose coupling of the system.
Keywords/Search Tags:Access Control, Repeated-Role, Task Priority, Context
PDF Full Text Request
Related items