首页 | 本学科首页   官方微博 | 高级检索  
     

基于双矩阵访问的控制技术
引用本文:杨光豹,郑慧锦.基于双矩阵访问的控制技术[J].计算机系统应用,2014,23(4):91-96,56.
作者姓名:杨光豹  郑慧锦
作者单位:浙江广播电视大学 青田学院, 青田 323900;浙江青田职业技术学校, 青田 323900
摘    要:在企业级web系统的应用中,传统的用户权限管理的方法是按功能模块进行粗粒度分配,首先将系统中各个模块的操作权限赋予特定的角色,然后再将这些角色赋予某些用户. 这种基于角色的权限管理缺少灵活性,不能做到“量身定制”;对于具有多种角色权限的用户来说,使用系统时会存在诸多不便,同时在系统扩展时权限管理与业务功能会相互影响,它会给程序员带来额外工作量. 为了改进上述缺陷,本文提出利用Struts2、Spring3、Hibernate4等进行整合开发Web系统,通过权限管理拦截器对每个用户请求进行权限验证,使系统能够采用细粒度方式管理用户权限,增强权限管理的灵活性与系统的可扩展性.

关 键 词:基于角色的访问控制  访问控制矩阵  拦截器  Spring  Struts2  Hibernate
收稿时间:9/6/2013 12:00:00 AM
修稿时间:2013/9/29 0:00:00

Access Control Technology Based on Multiple Matrix
YANG Guang-Bao and ZHENG Hui-Jin.Access Control Technology Based on Multiple Matrix[J].Computer Systems& Applications,2014,23(4):91-96,56.
Authors:YANG Guang-Bao and ZHENG Hui-Jin
Affiliation:School of Qingtian, Zhejiang Radio & Television University, Qingtian 323900, China;Zhejiang Qingtian Vocational and Technical School, Qingtian 323900, China
Abstract:In the enterprise web application system, the access powers of user are used to be assigned on the basis of the function module of system in traditional methods. First, we used to assign the power of every module to different roles, and then these roles were assigned to some particular users. This access control technology based on roles lacks flexibility and cannot make to measure; it makes it very inconvenient for the user who has multiple roles in web application system. Furthermore, it will bring extra work in system expansion due to interaction effect of authority manage and business function. To improve the above- mentioned defect, this thesis puts forward methods of developing web system by integrating frameworks of Struts2, Spring3 and Hibernate4. It validates the log-in and permission of access for every request by the permission-interceptor. In this way, the web system can control user access powers in fine grain and Enhance the flexibility and expandability of system.
Keywords:RBAC  access control matrices  interceptor  spring  Struts2  Hibernate
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号