| With the rapid development of information and increasingly competitive of today's society, traditional manufacturing has been gradually replaced, networked manufacturing is becoming a new paradigm for manufacturing industry. As a typical technology of networked manufacturing, MES (Manufacturing Execution System) is the bridge of the manage system and the control system. Data acquisition system is the key technology of MES, so data acquisition system is also a key technology of realization networked manufacturing system. The acquisition information of enterprise needs to be stored, sent and received in the system in which a great deal of intellectual asset requires protection. So, to ensure manufacture be safe and order and to ensure the information is not being leaked or stolen; networked manufacturing system put forward a high demand of the construction of the security system.As the characteristics of a lot of users in the enterprise information system and the work position changed constantly and the work processes is complex and a lot of organizational structure and task, access control model required to meet the distributed management; also support the active access control and passive access control; support a large number of users and object, and control role assignment, task assignment and competences assignment easily; should support different business rules and workflow. Aiming at the different types and importance of task and the context of the access control authorization requirements when the task executed, put forward access control model based on context and security level called SCTRBAC-introduction the security level and context based on the role-task of access control model (TRBAC), the extended model take fully consider of the security level and the physical environment, to better meet the access control requirements of enterprise. Meanwhile, this paper use Unified Modeling Language UML (Unified Modeling Language) to modeling, analysis and design of the model of SCTRBAC, and designed authentication system based on the dynamic password, and it was introduced to different user's level of identity authentication, enhanced the flexibility and robustness of enterprise access control systems. |