期刊文献+

文件检索与RBAC在OA系统中的应用 被引量:1

Realization of File Retrieval and RBAC in OA System
原文传递
导出
摘要 在OA(办公自动化)系统中,如何实现快速、方便的文件检索和权限控制,是当前研究的热点。本文阐述了采用FTP文件共享系统,数据库方式存储与目标文件有关的大量信息,可以根据文件名、文件大小、关键词、作者等多种方式查找文件,方便用户在浩瀚的OA系统中快速地找到所需要的目标文件;在权限管理方面采用RBAC(基于权限的存取控制)策略管理用户权限,提高系统的安全性。以达到方便,快捷地检索文件和灵活、安全管理的目的。 A topic of current interest is to use a file retrieval and an instant access control system easily in onlineaccess (OA) system. The paper describes using an FTP files sharing system, saving large amounts of information related to an objective file in a database.The system can search files according file name,file size, keywords, author's information and so forth.It is convenient for user searching objective files in large OA files.The RBAC policy administrator privileges are used for enhanced system security. The system makes it possible to retrieve files easily,expediently and safely with administrative flexibility.
出处 《网络安全技术与应用》 2006年第3期52-54,68,共4页 Network Security Technology & Application
关键词 FT 文件检索 RBAC 权限 办公自动化系统 OA系统 FTP File Retrieval RBAC Privilege
  • 相关文献

参考文献3

二级参考文献16

  • 1[1]Sylvia Osborn, Ravi Sandhu, Qamar Munawer.Configuring role-based access control to enforce mandatory and discretionary access control policies[J]. ACM Transactions on Information and System Security, 2000,3(2).
  • 2[2]Sandhu R., Coyne E.J., Feinstein H.L., et al. Role-baseed access control model[J]. IEEE Computer, 1996,29(2).
  • 3[3]Ravi Sandhu. Role activation hierarchies.In Proceedings of 3rd ACM Workshop on Role-Based Access Control[C]. ACM, Fairfax, October 1998.
  • 4[4]Sybase. Sybase Adaptive Server Enterprise Security Administration[M]. Sybase,1997.
  • 5[5]Sybase. Sybase Adaptive Server Enterprise Security Features User′sGuide[M].Sybase,1997.
  • 6[6]Oracle 8 Enterprise Edition-Server administrator′s[M], Guide,1997.
  • 7[7]Oracle 8 Enterprise Edition-SQL reference[M].Oracle,1997.
  • 8[8]Informix. Informix- Online Dynamic Server- administrator′s Guide-version 7.2(Vol 1 and 2)[M].Informix, 1997.
  • 9[9]Informix. Informix Guide to SQL:Tutorial[M].Informix,1997.
  • 10[10]Ravi Sandhu. Rationale database access controls using SQL. In Zella A. Ruthberg and Hal F. Tipton,editors, Handbook of Information Security Management[M]. AueRBACh Publishers, 1994.145-160.

共引文献34

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部