Font Size: a A A

Based On Rbac Universal Authorization Management System Research And Implementation

Posted on:2013-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y H ZhangFull Text:PDF
GTID:2248330395973962Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Since the new century, with the computer information technology as the foundation of all sorts of network information system has been developed by leaps and bounds, which brought about the data resources is becoming richer, more complex data structure, user information increasing condition has been made in the network access control management becomes more and more important, the network managers to ceaselessly in the technology innovation today, with certain technical means to realize network data resource access control, establish and improve the network data resource authorization system, guarantee the safety of these resources has already become an important problem faced by many industry. Role based access control (RBAC) is the most popular one of the access control technology, as a kind of compatibility, flexibility and strong adaptability to the key technique, RBAC can completely realize between user and privilege separation, solve the traditional access control methods of many defects.This thesis,on RBAC universal authorization management system research, firstly the background of the research are expounded, then the access control of the three main ways to conduct in-depth analysis, and compares their advantages and disadvantages, draw RBAC advantage; then based on RBAC universal authorization management system design and analysis, in accordance with the overall design and detailed design steps, further on this basis the system element model structure are analyzed, especially the relationship between the elements is the focus of this paper; finally in order to realize this system specific process as the main entry point to the system, a typical interface display and description of function, and the the combination of static object and the dynamic object authentication discusses concrete implementation process.
Keywords/Search Tags:role, access control, authorization, access, object
PDF Full Text Request
Related items