期刊文献+

基于角色访问控制的动态权限配置研究与实现 被引量:4

Research and Implementation of Dynamic User-Privilege Configuration Based on Role Access Control
下载PDF
导出
摘要 ERP系统可实现对企业的管理 ,随着企业的规模扩大 ,职责分工的细化 ,易造成责任不明 ,产生管理的困难 ,权限问题已成为影响系统安全性的重要问题。基于角色的访问控制 (RBAC)强调用户的权限不是由用户名而是由用户在组织中的角色决定的 ,通过角色间接的访问系统资源。文章研究了RBAC的体系架构 ,通过角色的桥梁作用实现了用户与权限的对应关系 ,保证了权限配置的灵活性和安全性要求 ;并通过与数据库的紧密结合 ,结合佛山某企业应用实际 ,实现了用户权限实时的灵活动态配置。 ERP system completed enterprise management. Because enterprise was enlarged and the function subsection was appeared, it brought duty blur and produced management difficulty. User-privilege is crucial for the security in the system. Role-based Accss Control emphasized the privilege was decided by the role of users in system, not decided by the name of users. The role plays a bridge and embodies the corresponding relation between the users and privilege. This paper realizes the dynamic configuration of the user-privileges by making full use of the database based on access control.
出处 《组合机床与自动化加工技术》 2005年第3期86-87,共2页 Modular Machine Tool & Automatic Manufacturing Technique
基金 国家重点科技攻关项目 (2 0 0 3BA1 0 3C)
关键词 基于角色访问控制(RBAC) 用户权限 动态配置 role-based access control, user-privilege, dynamic configuration
  • 相关文献

参考文献5

二级参考文献15

  • 1.GB17859.1999.计算机信息系统安全保护等级划分准则[S].,..
  • 2[1]Ravi Sandhu, E. Coyne, H. Feinstein and C. Youman.Role-based access control model[J]. IEEE Computer,Feb. 1996,29(2):38~47.
  • 3[2]Ravi Sandhu & David Ferraiolo.The NIST Model for role-based access control: towards a unified standard[S]. 5st ACM Workshop on RBAC, 2000:47~63.
  • 4[3]Michael J. Covington. Generalized role-based access control for securing future applications[C]. National Information Systems Security Conference, 2000.
  • 5[4]Tidswell J and Potter J. A dynamically typed access control model[C]. Third Australian Conference on Information Security and Privacy, July 1998,308~319.
  • 6[5]Glenn Faden. RBAC in UNIX administration[C]. 4th ACM Role-Based Access Control Workshop, 1999,95~101.
  • 7[6]Michael J, Swift M. Improving the granularity of access control in Windows NT[C]. Sixth ACM Symposium on Access control models and technologies, May 2001,87~96.
  • 8[7]Andreas Schaad, Jonathan Moffett and Jeremy Jacob. The role-based access control system of a European bank[C]. Sixth ACM workshop on SACMAT.2001,3~9.
  • 9[8]Ravi Sandhu, Qamar Munawer, How to do discretionary access control using roles[C]. 3th ACM workshop on RBAC.1998,47~54.
  • 10[9]Sylvia Osborn. Mandatory access control and role-based access control revisited[C]. Proceedings of the Second ACM Workshop on RBAC, 1997,31~40.

共引文献62

同被引文献21

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部