Font Size: a A A

Research And Implementation On Location Based Privilege Management System

Posted on:2008-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:C Y LiFull Text:PDF
GTID:2178360242977544Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
It's well known that the mobile communication is growing very fast and developing across several generations. It has a huge group of customers, and covers a broad area. At the same time, services based on mobile network is also expanding rapidly, attracting large attention from the providers and connectors.With the growing amount of application system based on mobile network and the larger scale of the application, it has become a big challenge for implementation of system authentication security and effective management.RBAC model is one of the most popular authentication security management models and it can meet most application needs and realize secure and effective system by implementing specific requirements in the projects. The thesis illustrates the implementation and expansion of RBAC model based on the characteristic of mobile network and geography information application system.As basic technology applying, the thesis briefly introduces the LBS business category, location technology and precision etc. Those technologies are basement of mobile location services implementation and they are widely used in application systems, having high potential of developing. At the same time, LBS client terminal position changed frequently and application service authority and terminal geography tightened closely.According to that character, the thesis proposed the new model based on the RBAC model. It illustrates the history and structure of RBAC model, and even extends the RBAC model, adding role based access control of geography location, and then forms the LRBAC model. The model categorizes roles into geography related roles and geography non-related roles and manages them accordingly. For geography related roles, the model adds the geography information property, hence enhances the authority management for the systems and implements safer access control.In addition to the analysis and integrity of the model, the thesis details the requirement analysis according to the practices of project authentication management, and provides the system hierarchy, wireless network basis and application. Then it presents the architecture, data structure and related design for authentication access control part.
Keywords/Search Tags:data security, RBAC, privilege management, access control, LBS
PDF Full Text Request
Related items