Design and Implementation of Dynamic Menu Based on Role-Based Access Control

被引:0
|
作者
Chen, Ying [1 ]
Yang, Fengyu [1 ]
机构
[1] Nanchang Hangkong Univ, Coll Software, Nanchang 330063, Peoples R China
关键词
RBAC; Dynamic Menu; NET; C#; RBAC MODEL;
D O I
10.4028/www.scientific.net/AMR.753-755.2990
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Every application systems must provide different menus for different users and its corresponding operation authorities of different roles. While static menus, hidden menus and disabled menus lack flexibility, dynamic menus can overcome this shortcoming. In this paper, based on the theory of role-based access control, we propose the Mechanism of different roles have different authority and dynamically generate corresponding dynamic menus. What's more, we instantiate corresponding basic data table and relational data table, introduce the key techniques of using C# to implement dynamic menus and develop corresponding system. This system can timely generate dynamic menus according to the changes of relationship tables and entities, which make the system, have good usability and scalability.
引用
收藏
页码:2990 / 2994
页数:5
相关论文
共 50 条
  • [41] Cryptographic Role-Based Access Control, Reconsidered
    Liu, Bin
    Michalas, Antonis
    Warinschi, Bogdan
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289
  • [42] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [43] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [44] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    [J]. ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [45] Static Enforcement of Role-Based Access Control
    Ali, Asad
    Fernandez, Maribel
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (163): : 36 - 50
  • [46] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [47] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [48] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [49] Spatial context in role-based access control
    Zhang, Hong
    He, Yeping
    Shi, Zhiguo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2006, PROCEEDINGS, 2006, 4296 : 166 - 178
  • [50] A novel approach to role-based access control
    Chae, SH
    Kim, W
    Kim, DK
    [J]. COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1060 - 1068