Design and Implementation of Privilege Management System Based on RBAC

被引:0
|
作者
Lu Pengyu [1 ]
Song Hui [1 ]
He Liangjun [1 ]
机构
[1] Harbin Inst Technol, Sch Management, Harbin 150006, Peoples R China
关键词
permission; RBAC; Struts2.0; access control;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
To satisfy the requirements of secure among enterprise information system, access control seemed as an information security technology has been used in more and more modern enterprises. Administration of an RBAC system using role based approach has become very appealing because of the benefits that a role-based approach typically brings. In this paper, the scope of traditional RBAC models is carried out and requirements of privilege management based on B/S mode are analyzed. The persistence layer, business layer and control layer of system are implemented under the framework of integration of spring and Hibernate by Struts2.0. Compared with the current privilege management infrastructures, because the struts2.0 framework is integrated with different kinds of frameworks, the interoperability of the system has been achieved. Based on the Filter mechanism, the authorized authentication is implemented conveniently. And the flexibility of permission maintenance has been provided by the design of resource entity.
引用
收藏
页码:5078 / 5081
页数:4
相关论文
共 50 条
  • [1] Design and Implementation of Authorization System Based on RBAC
    Li, Furong
    Wu, Haitao
    2015 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS IHMSC 2015, VOL I, 2015, : 502 - 504
  • [2] The RBAC based privilege management for authorization of wireless networks
    Park, DG
    Lee, YR
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2003, 2762 : 314 - 326
  • [3] Enterprise privilege management based on T-RBAC
    Jin, Qiongcheng
    Yang, Shutang
    Jiang, Xinghao
    Li, Jianhua
    Jisuanji Gongcheng/Computer Engineering, 2004, 30 (19):
  • [4] THE DESIGN OF THE SECURE TRANSMISSION AND AUTHORIZATION MANAGEMENT SYSTEM BASED ON RBAC
    Lu, Guoqing
    Zhao, Lingling
    Yang, Kuihe
    PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 103 - 108
  • [5] The ET-RBAC based Privilege Management Infrastructure for wireless networks
    Park, DG
    Lee, YR
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 84 - 93
  • [6] RBAC policies in XML for X.509 based privilege management
    Chadwick, DW
    Otenko, A
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 39 - 53
  • [7] Design and Implementation for universal Privilege Management Infrastructure
    Li, Jin
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 3125 - 3129
  • [8] Analysis of Privilege Escalation Based on Hierarchical RBAC Model
    Ma, Li
    Yan, Yongjie
    Jiang, Huowen
    Zhou, Yanjie
    5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
  • [9] The Graduation Design Management System Based on ASP Design and Implementation
    Sun, Cheng
    Liu, Haiyan
    2017 4TH INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2017), 2017, 86 : 281 - 285
  • [10] Implementation of LSM-based RBAC module for embedded system
    Lim, Jae-Deok
    Un, Sung-Kyong
    Kim, Jeong-Nyeo
    Lee, ChoelHoon
    INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 91 - +