Font Size: a A A

Research And Application Of Access Control

Posted on:2009-11-23Degree:MasterType:Thesis
Country:ChinaCandidate:S F YinFull Text:PDF
GTID:2178360272492121Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Access control technology takes a vital part in the safety of information system. With the popularization of the information system and especially the rapid increase of internet application, the size of users in access control system needed to be supervised is increasing fast. So to administrate the large number of users by the traditional pure man-managed way is more and more difficult. And this research is intended to find an access control system which can be used by the information system with large number of users.The author first made a careful and deeply study of the existing access control systems. During the process, some certain kinds of representative access control technologies were consulted by the author to analyze the principles of achieving access control technology. The author mastered the orientation and effect of these definitions in access control system. The author believed that the rule of authority had lot to do with its applying situation, and this rule could be existed the applying situation of access control. The author found that there was a relationship of leading and concluding between the authority of users and statistic information in the operation system. So the author came up with the intellectualized access control technology based on these researches, which aimed to construct an intellectualized control model by introducing an intellectualized model in the role-based access control system. And this Auto-adapt Access Control technology and its possibility were discussed froe the angle of technology achievement and cost.At last, a set of Auto-adapt Access Control system was applied in the personnel management in an university. This was based on the personnel operation, and achieved the Auto-adapt model, to make the system can correctly assign the management of the users and their authority. And it solved the countless problems which were caused by man-managed administration. By the application of this system, the possibility, merits and demerits of the intellectualized access control system has been proved preliminarily on one hand, and it established the basis for the further research on the other hand.
Keywords/Search Tags:Information Security, Access Control, Maintenance, Auto-adapt
PDF Full Text Request
Related items