Font Size: a A A

Research And Application Of Wed-based RBAC Permission Model Base On.NET Technology

Posted on:2015-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:C WangFull Text:PDF
GTID:2298330452960338Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information, the Internet and network technology,business management systems, such as ERP system, CRM system, OA system and so on, arewidely used in many companies. Each company has their own customized software systemthat fits the reality and needs of their own company. Along with the popularization and widerapplication of these software systems, they are facing the problem of system security.Ensuring the safety of the system as well as allowing the system administrator to quicklyassign security permissions so as to better adapt to changing business becomes a prior task toall software companies. In the information system, the core of all business system securitycontrols are often similar. All have to decide what each person can do and what informationhe can have access to. If the permissions model can be designed into an independent butcomplete set of modules, it will no double greatly reduce the cost of software companieswhile improving the security of systems. By extending and perfecting the existing RBACmodel, this paper proposes a new permissions model which at the same time makes use of theASP.NET technology from Microsoft’s Visual Studio. Furthermore, this paper verifies therationality and practicability of the new permission model through strict developmentprocesses starting from requirements analysis to design, development and tests.With reference to the Visual Studio NET technology, Cache, RBAC model&designpattern technology, this paper analyzes the requirements of common business needs and theRBAC model in depth and puts forward an extended permissions model called RRBAC.Based on researches on the development mode of the MVC framework, the RRBAC modelpulls away authority modules and reduces the coupling degree of business and permissionswith the help of the Filter. It learns from the design patterns written by Gof and uses suchpatterns as factory pattern, template pattern, etc.,to improve its own scalability. It adopts thedistributed cache in order to guarantee smooth activation, authorization and control in thefinal system operations.Finally, this paper develops a set of permissions components with resort to the.NETtechnology based on the RRBAC model. It allows the security administrator to flexiblyconfigure the whole business system, such as the the menu page, functional permission,business data, etc. Through tests, these permission components have been proved to betransplantable and adaptable to most permission requirements of a majority of businesses.
Keywords/Search Tags:ASP.NET, Role-based access control, Rule, MVC
PDF Full Text Request
Related items