Font Size: a A A

Research Application On The Extended Model Of Access Control Based On Role And Tasks

Posted on:2009-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:Z SongFull Text:PDF
GTID:2178360242492798Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of network technology and its popularity, information-sharing application is increasingly widespread and developing in-depth, and meanwhile the problems of network information security also become increasingly obvious, and the situation gets more and more complicated. With the continuous strengthening of network technology application and the improvement of safety awareness, all kinds of security technologies have been developed and applied to some unprecedented extent. There appears one technology after another, such as intrusion detection technology, encryption-decryption technology, identity certificate, access control technology, verification and so on. However, security threats have not disappeared. On the contrary, due to the promotion of network applications and the complexity of business service, network brings forth not only benefits to people, but also potential and tremendous threats and losses. Therefore, the further research and development on information security technology will make sense and be promising. Access control is a key measure, which protects system resources and makes confidential data free of illegal deletion, destruction or stealing. In information management system, the system should own the ability to judge whether a user is authorized to use, revise, examine or duplicate certain system resources. The role–based access control model RBAC is a leading access control model at present. It is preferred compared with traditional discretionary access control and mandatory access control, and simultaneously it has more flexibility and extension. This dissertation studies emphatically access control technology, role-based and task-based access control models, and also has integrated these two models into T&RBAC model. And then EA-T&RBAC model is acquired by expanding the model which combines task and role control.The main research work and results are as follows:(1) Theories and current application situation of access control have been analyzed. Role-based and task-based access control models are studied emphatically. Traditional model RBAC, role management model ARBAC97 and task management model TBAC have been described and analyzed.(2) It is studied that role and task management are applied together in access control model. On basis of this, the concept of self-control is introduced, and finally EA-T&RBAC model is put forward. In addition, encryption technology is embedded in identity authentication and access control of confidential data, which further enhances the safety of information system.(3) Finally, the expanded model, EA-T&RBAC , is applied in the design and development of control system of project construction cost, with the goal to enhance information system security.
Keywords/Search Tags:Access Control, Role, Task, Identity Certificate, Constraint
PDF Full Text Request
Related items