Font Size: a A A

Design And Implementation Of E-government System’s Access Control Based On RBAC

Posted on:2015-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:W ZhongFull Text:PDF
GTID:2268330428978137Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In order to fit the fast development of information industry, improve and extend the ability of information processing, take advantage of Internet resources, more and more governments start to apply paperless e-government system. Recently, with the overwhelming popularity of web applications, E-government system also reflects the trend to increase productivity and streamline institutions inside governments. Owe to e-government system, not only resource sharing is enhanced, but also ease the process of employee’s daily work, with much redundant overhead cut plus. In one word, e-government system has been merging with rising government in comprehensive levels.However, the problem of information security has become the focus of our attention. How to assign appropriate roles to the appropriate users, so they can access to the information they need and not cross the border into e-government platform must solve the problem. Thus, we introduce the concept of access control.Based on the thought of RBAC, the design, the realization of "safety management user role operation",reached according to each user role assignment different permissions to. Each user access within their own jurisdiction information, has ruled out the possibility that the user overflow, which ensures theinformation security of e-government system, convenient for the management to the system. At the same time, based on the three layer architecture model of the principle, the representation layer of e-government system, business logic layer and data access layer to separate, so that the level of the system is more convenient, the maintenance of the system, from a certain extent to improve the securityof e-government system of Shanghai Dian Ji University.
Keywords/Search Tags:e-government, RBAC, Access Control, 3-layer architecture model
PDF Full Text Request
Related items