首页 | 本学科首页   官方微博 | 高级检索  
     

面向复杂信息系统的用户管理策略
引用本文:孙宏波,颜波,黄必清,郑国勤.面向复杂信息系统的用户管理策略[J].计算机集成制造系统,2004(Z1).
作者姓名:孙宏波  颜波  黄必清  郑国勤
作者单位:清华大学软件学院计算机图形学与辅助设计研究所,清华大学国家工程技术研究中心,清华大学国家工程技术研究中心,清华大学软件学院计算机图形学与辅助设计研究所 北京 100084,北京 100084,北京 100084,北京 100084
基金项目:国家863/CIMS主题资助项目(2003AA414330)。~~
摘    要:网络环境下的复杂信息系统,在开放、半开放环境下普遍面临着客户端权限确认、权限属性定义、动态权限设置以及主动保护等问题,而传统用户管理静态权限设置和直接授权的模式很难解决这些问题。为此,提出了基于权限对象的用户管理策略,将用户管理过程分为身份证实、权限控制和操作监控等三个阶段。身份证实阶段主要解决开放、半开放环境下的用户身份认证问题;权限控制阶段引入权限对象,有效地解决了权限属性定义、动态权限指派、客户端权限确认等问题;监控阶段则重点解决主动保护问题。

关 键 词:用户管理  权限对象  权限控制  复杂信息系统

User control strategies for complicated information systems
SUN Hong-bo,YAN Bo,HUANG Bi-qing,ZHENG Guo-qin.User control strategies for complicated information systems[J].Computer Integrated Manufacturing Systems,2004(Z1).
Authors:SUN Hong-bo  YAN Bo  HUANG Bi-qing  ZHENG Guo-qin
Affiliation:SUN Hong-bo~1,YAN Bo~2,HUANG Bi-qing~2,ZHENG Guo-qin~1
Abstract:Complicated information systems under network environment commonly faced with problems of end-users rights identification, right properties definition, dynamic rights configuration, and active protection under an open or semi-open environment, whereas traditional users' static rights configuration management and direct authorization couldn't solve these problems. The user control strategies based on authorization objects were proposed, which consisted of three stages: identification authentication, access control and operation monitor. In identification authentication stage, the user's identification authorization under an open and semi-open environment was solved. In access control stage, authorization object was introduced to resolve rights properties definition, dynamic rights assignment, and rights identification of end-users. And the operation monitor stage was mainly focused on active protection.
Keywords:user control  privilege object  access control  complicated information system
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号