期刊文献+

B/S环境下CIMS安全模型设计与实现 被引量:2

Design and Implementation of Role-Based CIMS Security Model under B/S Environment
在线阅读 下载PDF
导出
摘要 随着网络被非法攻击的可能性增大,提出了一种B/S环境下的基于角色的访问控制双层模型。该模型将RBAC合理运用于数据库层和Web容器层。同时辅以基于角色的菜单定制形成系统安全模型,将角色融入到系统的各个应用层面,统一管理系统各个应用层面的系统资源,从多个层面来保护系统安全。利用这种安全模型,采用Oracle9i/BES6.5/j2ee技术设计,实现了一套浏览器/服务器环境下的计算机集成制造系统的安全管理子系统。 Role-based access control (RBAC) is a major technology in computer integrated manufacturing systems (CIMS)'s security management. In this paper, a double-layer RBAC model under B/S environment is presented. In this model, RBAC is applied to both database layer and web container layer. Furthermore, A CIMS security model is established with the help of role-based custom-built menu technology. This security model is applied to all application layers to protect the system resource located at different application layers. Using this security model and the technology of Oraclegi/BES6.5/j2ee, a CIMS's security management system under B/S environment is realized.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2008年第1期109-112,共4页 Journal of University of Electronic Science and Technology of China
基金 国家863/CIMS主题资助项目(2003AA411210)
关键词 浏览器/服务器环境 计算机集成制造系统 基于角色的访问控制 安全模型 B/S environment computer integrated manufacturing systems(CIMS) role-based accesscontrol security model
作者简介 刘孝保(1978-).男,博士生。主要从事ERP/CAE方面的研究.
  • 相关文献

参考文献7

二级参考文献39

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2陆荣杰,刘知贵,黄晓芳.J2EE中基于容器管理的Web客户端安全验证[J].兵工自动化,2005,24(3):47-48. 被引量:4
  • 3R Sandhu, V Bhamidipati, O Munawer. The ARBAC97 model for role-based administration of roles. ACM Trans on Information and System Security, 1999, 2( 1 ) : 105--135.
  • 4J Luciani. Server cache synchronization protocol (SCSP). RFC2334, 1998.
  • 5D Wessles, K Claffy. Application of Internet cache protocol(ICP), version 2. RFC 2187, 1997.
  • 6D Wessles, K Claffy. Internet cache protocol(ICP), version 2.RFC 2186, 1997.
  • 7D Wessles, K Claffy. ICP and the squid Web cache. National Laboratory for Applied Network Research. 1997. http://www. nlanr, net/-- wessels/Papers /icp-squid. ps. gz.
  • 8D Wessels. The squid intemet object cache. National Laboratory for Applied Network Research. 1997. http.//squid. nlanr.net/Squid/
  • 9EnCommerce. getAccess. 2001. http://www. encommerce.com/products.
  • 10R Sandhu, E Coyne, H Feinstein et al. Role-based access control model. IEEE Computer, 1995, 29(1): 38--47.

共引文献124

同被引文献14

  • 1汪同庆,鲁军,华晋,倪水平.基于MD5算法和Schnorr协议的双因素身份认证系统[J].计算机应用研究,2004,21(12):137-139. 被引量:12
  • 2石季英,张磊,曹明增,许光全.一种基于混沌理论的分布式系统的加密算法[J].计算机仿真,2006,23(6):137-138. 被引量:7
  • 3龙毅宏,周祖德,刘泉.动态口令的安全脆弱性分析及对策[J].信息安全与通信保密,2006,28(7):16-17. 被引量:10
  • 4Hung L X,Giang P D.Trust-based security architecture for ubiqnitous computing systems[C] //LNCS 3975.Berlin,Heidelberg:Springer-Verlag,2006:753-754.
  • 5Zhu Z W,Leung H.Adaptive identification of nonlinear systems with application to chaotic communications[J].IEEE Trans Circuits Syst Ⅰ,2000,47:1072-1080.
  • 6Bruce Eckel Thinking in Java[M].4th ed.USA:Prentice Hall PTR,2007.
  • 7段刚.加密与解密[M].3版.北京:电子工业出版社,2008.
  • 8Kou C Y, Springsteel F. The security mechanism in the World Wide Web(WWW) and the common gateway inter- face(CGI) [C//Proceedings of IEEE 31st Annual 1997 In- ternational Carnahan Conference on Security Technology, 1997:114--119.
  • 9Chen Y M, Zhao J, Zou Y B, et al. Of{ice automation system for enterprise based-on. NET[J] Journal of Donghua Uni- versity: English Edition, 2010,27 (4) 522-- 529.
  • 10Sandhu R, Ferraiolo D, Kuhn R. The NIST model for role- based access control: towards a unified standard[C]//Pro- ceedings of 5th ACM Workshop on Role-based Access Control, Berlin, Germany, 2000 47-- 63.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部