期刊文献+

基于角色的访问控制模型在实验室教学管理系统中的应用 被引量:4

Application of RBAC in Laboratory Education Information System
下载PDF
导出
摘要 从实验室教学管理系统的特点出发,讨论了基于角色的访问控制模型RBAC在实验室教学管理系统中应用的优势。同时,又根据B/S结构的信息管理系统的实际情况,以“东南大学电工电子实验中心教学管理系统”为对象,建立了一种用户—角色—页面组权限模型,给出了模型E-R图和权限获取的UML图,并给出了模型应用的实际效果。 Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system. Considering the practical situation of B/S structure, a User-Role-Page Group permission module was built. The module was described in E-R module and UML/Sequence draft. The result of the implementation in the Southeast University Electrical and Electronic Experimental Center Education Management System was given to show the module' s merits.
作者 蒋玮 胡仁杰
出处 《实验室研究与探索》 CAS 2007年第6期4-6,22,共4页 Research and Exploration In Laboratory
基金 高等学校仪器设备和优质资源共享系统实验教学示范中心资源共享信息建设项目 子项目编号:CERS-6-2-XX
关键词 RBAC 角色 访问控制 ASP.NET role-based access control (RBAC) role access control methods ASP. NET
  • 相关文献

参考文献9

二级参考文献20

  • 1[1]Anderson J P.Computer Security Technology Planning Study. ESD-TR -73-51, Vol. 1 and 2, Hanscom AFB, Mass., 1972 (also available as DTICAD-758206)
  • 2[2]Ames S R, Gasser J M, Schell R R. Security Kernel Design and Implementation:An Introduction, Com puter, 1983,6(7): 14-22
  • 3[3]Dept. of Defense Standard. Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, GPO 1986-623-963,643 0, 1985-12-26
  • 4[4]Lampson B W. Dynamic Protection Structures. In Proceedings of the AFIPS Fall Joint Computer Conference, Volume 35, Las Vegas,Nevada, 1969-11:27-38
  • 5[5]Lampson B W. Protection. Proc. Fifth Princeton Symp. Information Sciences and Systems, Princeton Univ., Princeton, N.J.,1971-03: 437-443, Reprinted in Operating System Rev., 1974,8(1 ): 18-24
  • 6Yan Han,ACM SIGSOFT Software Engineering Notes,2000年,25卷,2期,64页
  • 7Dewan D,ACM Transactions Computer Human Interaction,1998年,5卷,1期,34页
  • 8张龙祥.UML与系统分析设计[M].北京:人民邮电出版社,2002..
  • 9MICHAEL E S,GAIL J A.UML-based Representation of Role-based Access Control[A].In:Proceeding of 5th IEEE International Workshop on Enterprise Security(WETICE 2000)[C].2000.14~16.
  • 10BELOKOSZTOLSZKI A, EYERS D M, MOODY K. Policy contexts:Controlling information flow in parameterised RBAC[A].In:Policy 2003: IEEE 4th International Workshop on Policiesfor Distributed Systems and Networks[C]. 2003.

共引文献102

同被引文献23

引证文献4

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部