Research of Role's Creation-Based Access Control Policy

Article Preview

Abstract:

Role-based access control policy has been widely applied to various access control system design. In order to improve the flexibility of authorization check design and convenience of management, this paper uses the principle of dynamic proxy design to optimize this process, also provide a method which is Spring AOP based of transaction management for program running. The role-create method proposed can configure the users authority flexible. The improved design concept can achieve the basic requirements if role-based access control policies, and improve the efficiency of project development and security of application system maximum.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 791-793)

Pages:

1790-1793

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] WEN Jun-hao, ZENG Jun, ZHANG Zhi-hong. Security Policy of Attribute-based Access Control in SOA [J]. Computer Science, 2010, 37 (9): 147-150.

Google Scholar

[2] Fenga Dengguo. Network Security Principle and Technology[M]. Beijing: Science Press, (2009).

Google Scholar

[3] Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein etal. Role-based access control models[EB/OL]. IEEE conferences, (2006).

Google Scholar

[4] Li Xiaofeng, Feng Dengguo, Xu Zhen. A Generic Access Control Administration Model[J]. Journal of Computer Research and Development, 2012, 44(6): 947-957.

Google Scholar

[5] Gray Mak. Spring Recipes a problem-solution approach[M]. Beijing: Posts & Telecom Press, (2009).

Google Scholar