Font Size: a A A

Rbac-based Design And Implementation Of Party System

Posted on:2011-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y HuFull Text:PDF
GTID:2198330332974136Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Access control, as one of five standard security services defined by the international standard organization, is an important mechanism for the security of information systems. Nevertheless, some traditional approaches, such as Discretionary Access Control and Mandatory Access Control, are not suitable for systems where more sophisticated access control is needed. As a result, Role Based Access Control has become a hotspot in research fields in recent years.Party case management includes the party's propaganda and education work, the party's discipline inspection work, organization and personnel management, and grass-roots party building. The grass-roots party building work is mainly around the development of the core members of the organization. Organization develop work is typical a treatment process-oriented business processes because it regards the handling process of the party m ember's organizational development as its based clues. According to the characteristic of the party case, party case management system should use B/S model,3-Tier Structure and use Oracle as its database. In different stages of the organization developing process, party workers playing different roles, have different access priority. Therefore, the role of party case management system must use RBAC to strictly control the system access priority.In order to realize the application of RBAC in the party case management system, first of all is to distinguish the difference of role and job, and post or a rough equivalent to the user group. Deeply comprehend the intrinsic quality of role-in a particular system, in particular speaking context, abstract of user's priority of accessing data (reading, writing, revision). After this, using "two stage Assignment" to detail role to "role class" and "role sub-class". Giving role definition of the party system management, and then associate the party case worker's responsibility, analysis the party management system role attributes in detailed, and defines the role of the different functions. At last, on the basis of RBAC96 model, give out the user table, the role table, the priority table and their relations, and then, establish the access control database of the party case management system. Then, it can realize RBAC96 model application in access control of the party case management system, ensure the security of access control of the system.After testing, it make clear that the application of RBAC96 model in the party case management system is good at dominate of access control of the system, ensure the system security.
Keywords/Search Tags:Access control, Role, Role based access control, Party case management
PDF Full Text Request
Related items