Font Size: a A A

Research And Application Of Access Control In Content Management System

Posted on:2014-09-24Degree:MasterType:Thesis
Country:ChinaCandidate:C HuangFull Text:PDF
GTID:2268330401471911Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Content Management System is used to manage a mass of complex data and information from a website’s back-end. It provides administrators with the entrance of the website management, and make the operation and maintenance of the system more efficient and convenient. Content management systems are generally divided into three categories:content management systems focusing on foreground content publishing, on style designing, and on back-end managing, the third of which was studied and researched in this article.At present, the main scenario of access control in back-end content management system is role-based access control (RBAC), which has the disadvantage that the control granularity is not granular enough after all. This article aimed to study the solution of refining the access control granularity in content management system. In this article, a improved model based on RBAC was raised, and the implementation mechanism was described detailedly. The custom security tags and the mathematical model for assigning permissions raised in this article were both innovative work.The custom security tags achieved fine granularity access control in the presentation layer. The fine granularity access control in the data access layer was achieved by the tags combined with data entities and their attributes. The custom security tags have the advantage of good security and scalability. In this article, the object part of the access control model was refined and classified, and the relationships among the objects were defined comprehensively, based on which, the permission assigning graph and the permission assigning optimization algorithm were raised, so that the permission assignments of the associated objects were associated. This made the permission assignments more accurate and the operation of the system administrators more efficient.
Keywords/Search Tags:content management, access control, fine granularity, permissionassigning graph
PDF Full Text Request
Related items