Design and Implementation for universal Privilege Management Infrastructure

Article Preview

Abstract:

For analyzing the multilayer structure of the J2EE, based on Role-Based Access Control, a model of privilege management infrastructure was designed. It was implemented after the discussion of the existing privilege management system. Moreover, the safe authority control was realized with good effect.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3125-3129

Citation:

Online since:

December 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jin Li. Tauthenticating mobile users protocol in wireless networks, ISIP2010. 404~407.

Google Scholar

[2] Zhuo Tang, Lin Zhao, Kenli Li, Ruixuan Li. A risk-based multi-domain interoperabilitys dynamic access control model. Computer Research and Development, 2009, 46(6)16: 948~955.

Google Scholar

[3] Y.M. Dong, Y.N. Rui, D.X. Shuai. The Researching of Constructing a Convenient Safe Credible New E-Government System Intelligent Transportation Systems, 2003. 1719~1723.

DOI: 10.1109/itsc.2003.1252777

Google Scholar

[4] Lansheng Han, Fan Hong, Ting Luo. The three principles of safety in Role-based access control. Huazhong University of Science and Technology (Natural Science), 2006, (01).

Google Scholar

[5] Zhen-jiang Wang, Qiang Liu. Extended RBAC-based access control model. Computer Engineering and Applications, 2005, (35).

Google Scholar

[6] Yi Chen, Guohua Geng, Ji Li. Dynamic access control technology research and application. Computer Development, 2006, (02).

Google Scholar

[7] Jin Li . University Website Evaluation Index System. Hubei Institute for Nationalities, 2009, 27 (04).

Google Scholar