Font Size: a A A

Based On Universal Rights Management Component Of The Rbac Model Design And Implementation

Posted on:2011-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:J P JiangFull Text:PDF
GTID:2208360305497992Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the developing and being mature of computer technology and Internet and the enlargement of the enterprise, the data sources that user can access are becoming more and more complicated. So it is a problem for various enterprise-class applications that how to manage the enterprise resources in an effective safety way. Recently, the development of Access Control Technology is lagging in China. There are a lot of problems and defects of the access control model in enterprise-class application. For example, the method of authorization is complicated, the operating of access is inflexible, commonality is lacking, and the granularity of access control is simple, and so on. As a result, it is a very important task in the security access control field in China to construct a common management component for user access to meet the increasingly complex requirements of security access control.Firstly, the features of the existing enterprise-class applications and the shortage of the security management are analyzed. The functional orientation of common access management component, the functional requirements and non-functional requirements are specified. Based on analyze and specification, the model of RBAC (Role-based access control) analyzes the whole structure of common access management component, creates the system model and designs and implements the data structure. At last, the common access management component is used in report statistical application system so as to verify the usability and validity of the component.
Keywords/Search Tags:Access Control, Role-Based Access Control, Security Management
PDF Full Text Request
Related items