Font Size: a A A

Information Collection And Publishing System Based On Access Control

Posted on:2012-06-05Degree:MasterType:Thesis
Country:ChinaCandidate:L H HuangFull Text:PDF
GTID:2178330335454105Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularization and application of the internet, on the one hand the computer network has been in all aspects of human social life, changing people's life and work and ways of thinking of. Today people can stay at home through the network to obtain the information they need, and through the release of information to achieve the interaction with other users. On the other hand with the dramatic increase in the number of internet users, the network environment is complex, network security is becoming increasingly prominent, and how to ensure network and information security become the focus of the industry. International Organization for Standardization (ISO) standards in network security (ISO7498-2) defines five levels of security services:access control service,authentication service, non-repudiation service, data integrity service and data confidentiality service, access control is one of the important parts. Through the access control technology, it can limit user access to key resources, also can prevent illegal users'invasion or legitimate users' inadvertently damage resulting from the operation to ensure the system security.Today most of the information systems use the mainstream of several access control techniques, namely Discretionary Access Control (DAC), Mandatory Access Control (MAC), Task-Based Access Control (TBAC) and Role-Based Access Control (RBAC), this in-depth analysis and comparison of the four access control techniques, focusing on analysis of the role-based access control.Role-based access control technology is an efficient, flexible and neutral access control technology that introducing the concept of role achieves simple and flexible management of system permissions,it is a very broad range of applications access control technology.Based on the audit integrated information management platform of China Datang Corporation for background, this thesis further explores role-based access control technology in information collection and publishing system's design and implementation,making system's access control more flexible and convenient.
Keywords/Search Tags:Access Control, RBAC, DAC, MAC, TBAC
PDF Full Text Request
Related items