Design and Implementation of Dynamic Menu Based on Role-Based Access Control

被引:0
|
作者
Chen, Ying [1 ]
Yang, Fengyu [1 ]
机构
[1] Nanchang Hangkong Univ, Coll Software, Nanchang 330063, Peoples R China
关键词
RBAC; Dynamic Menu; NET; C#; RBAC MODEL;
D O I
10.4028/www.scientific.net/AMR.753-755.2990
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Every application systems must provide different menus for different users and its corresponding operation authorities of different roles. While static menus, hidden menus and disabled menus lack flexibility, dynamic menus can overcome this shortcoming. In this paper, based on the theory of role-based access control, we propose the Mechanism of different roles have different authority and dynamically generate corresponding dynamic menus. What's more, we instantiate corresponding basic data table and relational data table, introduce the key techniques of using C# to implement dynamic menus and develop corresponding system. This system can timely generate dynamic menus according to the changes of relationship tables and entities, which make the system, have good usability and scalability.
引用
收藏
页码:2990 / 2994
页数:5
相关论文
共 50 条
  • [1] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    [J]. 2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [2] Modelling and Verification of Dynamic Role-Based Access Control
    Vistbakka, Inna
    Troubitsyna, Elena
    [J]. VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, 2018, 11181 : 48 - 63
  • [3] A logical approach to dynamic role-based access control
    Balbiani, Philippe
    Chevalier, Yannick
    El Houri, Marwa
    [J]. ARTIFICIAL INTELLIGENCE: METHODOLOGY, SYSTEMS, AND APPLICATIONS, 2008, 5253 : 194 - 208
  • [4] DESIGN OF DYNAMIC FINE-GRAINED ROLE-BASED ACCESS CONTROL STRATEGY
    Zhao, Wenfang
    Gao, Fei
    [J]. 2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 274 - 278
  • [5] Role-Based Access Control Implementation Using Prime Numbers
    Sahafizadeh, Ebrahim
    Sartoly, Sara
    Chamkoori, Alireza
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 234 - +
  • [6] Design and Implementation of A Role-Based Access Control for Categorized Resource in Smart Community Systems
    Shi, Siping
    Xu, Chengzhong
    [J]. 2016 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CCBD), 2016, : 181 - 186
  • [7] A new design scheme of role-based access control based on PKI
    Deng, Yuping
    Guo, Xiaowei
    Niu, Xiamu
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 669 - +
  • [8] Research and Implementation of Role-based Access Control Model Based on Partition Number
    Chen Jinyu
    Tong, Zhang
    [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 6 - 9
  • [9] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [10] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184