Font Size: a A A

The Authority Of The Access Control System Based Roles Design And Implementation

Posted on:2008-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:P YangFull Text:PDF
GTID:2178360272467593Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Access Control is that when access control system resources by unauthorized illegal operation, will be able to provide appropriate protective measures. The essence is that the use of the limited resources, can decide whether or not the main object of performing some operation.The paper by introducing the concept of the role, users map to the organization in a certain role and authority delegated to visit the corresponding role, According to users in the role of authority and control of the visitting . This bring the effective integration of traditional access control technology advantages, Also overcome their deficiencies, making the development and implementation of strategies to protect the process more flexible, also simplifies the administrator's management.This paper based Electric Power Communication Resources Management System for example, a detailed analysis of the network management system access control needs, presents the solution. The adoption of access control based on RBAC97 access control model, Raised the role of classification management algorithm and management algorithm authorized incremental principles. Provided authorization, access control, and power management functions for the users ,System operations,and Bottom data of the system.and provides a graphical tool for the role of management to simplify the administrator's work; As a result of the Access Control System Construction in J2EE top of the MVC model, and Communication technology-based RMI, make it as a client UI layer and other layers of middleware, Provided authorization and access control interface for Business function layer to achieve different functions of the business View, Provided data control interface For the bottom layer to achieve different data resources to the security access function .This paper discusses the RBAC97 model based on the Access Control System Design and key algorithm, and the access control system development prospects.
Keywords/Search Tags:Access Control, role, role-based access control, Middleware
PDF Full Text Request
Related items