Font Size: a A A

Roled-Based Access Control & Appliction Research

Posted on:2006-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:P LiuFull Text:PDF
GTID:2178360185955632Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,along with the tide of global internet,network technology has already been used in many fields extensively,and it will change the feature of the society. At the same time,the safety of network is becoming a more and more serious problem. ISO put forward a layer of safety structure system about the design standard of network safety system,and defined five functions of safety service:authentication service,access control service,security service,integrity service,no denial service. Access control service is an important item of network safety.It is a way to permit or limit access. Traditional technology has two ways:DAC(Discretionary Access Control)& MAC(Mandatory Access Control).But both have evident shortages,DAC shares a (share a part of) right of access to the personal users,that will bring disadvantages to the overall situation control. MAC has many weaknesses about continuously work and controllability of authorization.In 90s, RBAC(Role-Based Access Control ) availably overcome the weakness of traditional technology.With the help of roles corpus,custom can access resources through roles.It makes management more efficiency and provides a better management environment.So,RBAC has a very wide development foreground. In this item,I participated the whole project design,got the message from customers,took part in the application project design and were responsible for turning the science result into application result.At the same time,I were responsible for the management of the whole item. This paper includes:1. background of RBAC and some information about access control.2. theories research of RBAC, including the core & model.
Keywords/Search Tags:Role, Access Control, RBAC
PDF Full Text Request
Related items