Font Size: a A A

Research And Application Of Permission Management Model In PDM

Posted on:2014-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:X R LiuFull Text:PDF
GTID:2248330395997745Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Product data management by means of computer software, it help enterprises toimprove production processes, organize structure of product, provide efficient and safemanagement of electronic data, Integrated a variety of controls required by enterprises,coordinate the entire life cycle of the product, help enterprises to quickly enhance theproductivity and competitiveness in the market, shorten effectively the developmentcycle and reduce production costs while ensure product quality and optimize thedesign. Access control can effectively guarantee the security of data, ensure thelegitimate users operate reasonable specific data, and avoid data loss or leakage causedby the invasion of illegal users. In order to improve the efficiency of PDM users、playthe role of the PDM system and create considerable benefits to the enterprise, Wemust ensure the security of the data.Today’s mainstream access control models are RBAC and TBAC. Controlstrategy of RBAC RBAC is based on the completion of the task duties divided intodifferent roles, make the role associated with operations of object permissions, assignroles to users, and the user operate system indirectly through the role. TBAC based onworkflow tasks, solve the problem of access control in line with internal normsoperating angle, provide dynamic real-time safety management while taskingprocess.In the implementation process, the context of the task may have changed, thecorresponding change in the object of the main operating authority. Because the taskitself also has the timeliness, and have a data association or other relations betweenthem, so in the task-based access control, granted permission used by the main istimeliness and relevance.The development background of this paper is PDM project of Jilin University,School of Computer Science, based on RBAC and TBAC, and combine the demand ofproject to invent a new permission management model and finally apply it into system,summed up the discovery of a new rights management model of the S-TRBAC system.it retains role stratification and permission inheritance of the RBAC system, add theconcept of task dependencies and lifecycle, refine the type of permission, strengthenthe detection of the data security, filter out users、roles and permissions that has failedto reduce error of access resource caused by operating PDM system mistakes.
Keywords/Search Tags:PDM, Access Control, permission management, RBAC, TBAC
PDF Full Text Request
Related items