Font Size: a A A

Research And Pactice On Task And Role-Based Access Control Model

Posted on:2010-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:A D LuoFull Text:PDF
GTID:2178360275499090Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the computer technology and network, the internet has connected the government, business and the people's daily life closely. But, when we enjoy the conveniences of the network, we must copy with the kinds of challenges with the information securities. The networks without security is just like as a castle in the air, the safety is gradually become the first element of the network construction. According to the main information security technologies, this paper chosethe core strategy of the network security and protection--accesscontrol technology as the research content.The writer study and analyze the current mainstream access control models fatherly, such as TBAC,RBAC and TRBAC, and analyze the characteristics and limitations of their application. Particularly, introduce and analyze the model of TRBAC in detail, including its formal description, constraint rules, authorization rules, and security's analysis and so on. According to the security needs of the project of the portal system of the subject contest of this province and its specificcharacteristics of the business--the same user's access changes withthe business in this system, we use the model of the TRBAC applying in the system. In the specific application, according to the specific business needs and enhancing the flexibility and Maintenance of the system, we make some improvement in the specific application of TRBAC, such as the modular management with the access permission and the system resource, and the classification ideology of the tasks' application based on object-oriented. When the design stage, we use the UML to model,analyze and design the TRBAC model, which provide the References for the specific realization of the system.Finally, basing on the specific application of TRBAC in this system, we use the Object-oriented method to realize the system, which makes all levels of the system independent relatively and ensures the system of the coupling loose. In addition, in order to improve the reusability of the codes, enhance the flexibility and maintainability of the system, we use the lightweight j2ee architecture for the development ,which is based on the integration of the Struts, Hibernate and Spring. And it makes the levels of the system more clear, and the program more robust.
Keywords/Search Tags:access control, RBAC, TBAC, TRBAC, UML, J2ee
PDF Full Text Request
Related items