Font Size: a A A

The Study And Application Implement Of Rbac

Posted on:2011-10-10Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2198330332466852Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of information age, automated information management system has been widely used in the management of enterprises,and the resulting safty problems of the management system are also increasingly seriously.Currently,in numerous measures of system security,access control technology is one of the key technologies to solve security issues.With the development of office automation systems in the hospital which the author participate in, the thesis makes study on a method to improve information system security around the security access control technologies of information system.Based on the analyzement of the common access control technologies such as DAC and MAC, and the analyzement of the role-based access control which were called RBAC as well, combined with the actual requirements of the OA system in hospital, referenced on the ideathe idea of RBAC in the design of system security, this thesis improves the access control of application systems, and improves the security of application system by using the conjunction of the database roles and permissions.On the basis of the description of the access control process of the application system hereafter,The thesis not only designs the assignment of the roles in the model of security access control,and then the distribution of the permissions,but also does the corresponding design and implementation of the whole system management porcess.According the specific application requirements of security controls in the hospital management system which the author participate in, the overall structure is designed, and the specific implementation strategies of the security access control model based on the roles of the application used in the system are introduced, as well as the codes which used to acquire the roles and permissions in RBAC and the basic man-machine interfaces are are given finally in this thesis.
Keywords/Search Tags:security technology, access control, application roles, role assignment, permissions
PDF Full Text Request
Related items