Design and Implementation of Privilege Management System Based on RBAC

被引:0
|
作者
Lu Pengyu [1 ]
Song Hui [1 ]
He Liangjun [1 ]
机构
[1] Harbin Inst Technol, Sch Management, Harbin 150006, Peoples R China
关键词
permission; RBAC; Struts2.0; access control;
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
To satisfy the requirements of secure among enterprise information system, access control seemed as an information security technology has been used in more and more modern enterprises. Administration of an RBAC system using role based approach has become very appealing because of the benefits that a role-based approach typically brings. In this paper, the scope of traditional RBAC models is carried out and requirements of privilege management based on B/S mode are analyzed. The persistence layer, business layer and control layer of system are implemented under the framework of integration of spring and Hibernate by Struts2.0. Compared with the current privilege management infrastructures, because the struts2.0 framework is integrated with different kinds of frameworks, the interoperability of the system has been achieved. Based on the Filter mechanism, the authorized authentication is implemented conveniently. And the flexibility of permission maintenance has been provided by the design of resource entity.
引用
收藏
页码:5078 / 5081
页数:4
相关论文
共 50 条
  • [21] The design and implementation of a Telecom management system based on workflow
    Liu, JX
    Xu, M
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 978 - 983
  • [22] The design and implementation of roadworks management system based on GIS
    Zhang, YouHeng
    Su, Baobing
    PROGRESS IN INDUSTRIAL AND CIVIL ENGINEERING II, PTS 1-4, 2013, 405-408 : 1739 - 1742
  • [23] Design and Implementation of Management System Based on Educational Technology
    Wang Li-sha
    Wan Pu
    Xu Guang-yang
    Ma Ji-dong
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 503 - 507
  • [24] The Design and Implementation of the Vendition Management System Based On Internet
    Wang, Ai-min
    Wang, Ji-peng
    Zhao, Zhe
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 6229 - 6232
  • [25] Extended RBAC-based design and implementation for a secure data warehouse
    Thuraisingham, Bhavani
    Iyer, Srinivasan
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 821 - +
  • [26] Design and Implementation of the RBAC-SOA Model
    Qu, Zhaoyang
    Meng, Na
    ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2945 - +
  • [27] The Formalization of Least Privilege Mining in RBAC
    Dong, Lijun
    Kang, Xiaojun
    Song, Jun
    Wang, Maocai
    MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES, PTS 1 AND 2, 2011, 480-481 : 1023 - 1027
  • [28] Implementation of Permission Management Based on Spring Security and RBAC1 Model
    Xiong, Yuanwei
    Wu, Weiming
    Gu, Yonghao
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 530 - 533
  • [29] Design of a Cross-Domain Privilege Management Prototype System
    Guo, Xianchen
    Chen, Chen
    Du, Jiepeng
    Li, Xinyou
    9TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, VOLS 1 AND 2: MULTICULTURAL CREATION AND DESIGN - CAID& CD 2008, 2008, : 1091 - +
  • [30] Design and Implementation of Vehicle Management System Based on the Ubiquitous Network
    Wu, Ling
    Qiao, Fei
    Lu, Jianfeng
    2013 IEEE 4TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2014, : 297 - 300