Font Size: a A A

Role-based Access Control (rbac) Applied Research, The Campus Network

Posted on:2009-10-16Degree:MasterType:Thesis
Country:ChinaCandidate:H DaiFull Text:PDF
GTID:2208360245982422Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Compared with traditional DAC and MAC models, Role-Based Access Control (RBAC) Model can provide better flexibility and scalability, and is nowdays the best and most popular access control model. According to the characteristics of university and considering the specific requirement of university administration model, the paper provides a URBAC model (University Information System-RBAC) based on the analysis of RBAC96 (Role-BasedAccess Control96) model and ARBAC97 (Administrative Role-Based Access Control97) model.According to the characteristics of models of access control.we introduce the concept of RBAC middleware, and explain in detail its designation and implementation. The middleware reserves various primitive operations with respect to different storage models, and provides high-level interfaces to the up-level applications. It makes the access control models development easily.URBAC model is composed of some parts, System component includes authorization management system, identification authentication server and access control server. Authorization management system adopts distributed architecture and composed of client management console and server authorization server. Identification authentication server provides password authentication and digital certificate authentication. Access control server provides files of user faced access control rule for application systems. Actually, URBAC model materializes the main characteristics of RBAC model, can satisfy application requirement of UIS. The model can commendably realize the universal resource access control in universal environment so as to provide some network Security reference for university information system.
Keywords/Search Tags:Role-Based Access Control, Access Control, Network Security, Middleware
PDF Full Text Request
Related items