Font Size: a A A

The Research And Implementation Of Permission Management System Based On RBAC

Posted on:2010-02-23Degree:MasterType:Thesis
Country:ChinaCandidate:J DongFull Text:PDF
GTID:2178360275953320Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the development of network technology and distributed technology, information security has become a very important problem in the designing of modern management information systems.To ensure the information security of systems,especially the security of sensitive and important information,people have proposed a lot of security mechanism and models,in which security access control is an efficient way to guarantee information security.Firstly,this paper analyzed the research status quo of access control at home and aboard,and pointed out that traditional access control-Discretionary Access Control can't satisfy the security requirements of modern systems any more.So Role-Based Access Control was proposed.RBAC imported role,and associated role and permission.RBAC grants the user permission according to assigns appropriate role to the user,which implements the logical separation of the user and the access permission.Importing RBAC to information management systems conquers the disadvantage of traditional access control,and provides a preferable control policy for achieving secure access.Making the development and implementation of strategies to protect the process more flexible,also simplifies the administrator's management.On the basis of introducing and analyze of RBAC96 and RBAC97 which are two representative role based access control model,the role design of RBAC model is extended by the requirement of permission management system.It adds priority of role inheritance and role authorization to avoid authorization conflict.By dividing permission into common permission and private permission.while introducing common inheritance and general inheritance,the papers solves the problem caused by private role.(this paper carries out the RBAC designing scheme of permission systems,) In practice,RBAC scheme is integrated in the permission management subsystem of the Dongguan telecom sales system.The RBAC scheme in this paper includes user design,role design,permission design,authority design,constraint management design and so on.Finally,The paper gives out particular design of database,and the design and realization of function model for the permission management system.The identity authentication and user_role assignment and role_permission assignment was completed in.net platform.completed role_based access control in permission management system.While This paper also argues the feasibility of applying RBAC to the permission management subsystem of the Dongguan telecom sales system.
Keywords/Search Tags:role-based access control, sales system, permission management, database designing .net
PDF Full Text Request
Related items