The Research of Workflow Access Control Methods Based on Spring Acegi

Article Preview

Abstract:

Access control through restricting users to access to resources, prevents invasion of illegal users and legal users access to unauthorized resources to ensure integrity and privacy of workflow data, which is the key of workflow security mechanism. According to the identity authentication and access authority control, the paper analyzes the safety management entrusted mechanism of Acegi which is Spring security framework, makes full use of its characteristics of depended injection (DI), and realizes statement and configuration of all kinds of safety components such as authentication management and access decision management.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

710-714

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Hong Xu, Weipeng Tai. RBAC model workflow-oriented [J]. Computer Engineering and Design, 2012, (4): 2-3.

Google Scholar

[2] Nan Ma. Research and application based on the J2EE security framework of Spring [D]. Beijing: Beijing Traffic University, (2009).

Google Scholar

[3] Rui Li. Research and application based on AOP and Acegi, access control technology [D]. Wuhan: Wuhan Polytechnic University, (2009).

Google Scholar

[4] Xia Lu, Hong Huang. Permission management and Implementation based on Acegi security framework. Computer Applications [J]. 2008, 17 (6): 2-3.

Google Scholar

[5] Peili Wu. The research of access control model of the workflow system based on the role[D]. Lanzhou: Lanzhou Polytechnic University, (2008).

Google Scholar