首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Design and Implementation of Role-based Access Control in a Teaching System
作者姓名:CHEN Jin-yu  LIU Dong-rong  LI Zhuo-wei  WU De-yin
作者单位:1. Instruction Affairs Office, Chongqing University, Chongqing 400030, China ; 2. Shenzhen LIAN-YOU Technology CO , LTD, Guangdong 518031, China ; 3. Department of Computer Science and Engineering, Chongqing University, Chongqing 400030, China
摘    要:This paper discusses how to design and implement a security subsystem, which based on the Role-based Access Control technology. By taking a teaching web system as a practical example, the paper establishes an access control matrix, so dynamic menu, page jump, and data access control are loaded. The experimental shows that, the system can controls the access authorized data, and to avoid the illegality access. The practicability and robust in the system is evident.

关 键 词:role  control      RBAC      access  control      management  of  authorization      teaching  management
收稿时间:2005/7/16 0:00:00
修稿时间:2005/7/16 0:00:00

Design and Implementation of Role-based Access Control in a Teaching System
CHEN Jin-yu,LIU Dong-rong,LI Zhuo-wei,WU De-yin.Design and Implementation of Role-based Access Control in a Teaching System[J].Storage & Process,2005(12):59-61.
Authors:CHEN Jin-yu  LIU Dong-rong  LI Zhuo-wei  WU De-yin
Institution:1. Instruction Affairs Office, Chongqing University, Chongqing 400030, China ; 2. Shenzhen LIAN-YOU Technology CO , LTD, Guangdong 518031, China ; 3. Department of Computer Science and Engineering, Chongqing University, Chongqing 400030, China
Abstract:This paper discusses how to design and implement a security subsystem, which based on the Role-based Access Control technology. By taking a teaching web system as a practical example, the paper establishes an access control matrix, so dynamic menu, page jump, and data access control are loaded. The experimental shows that, the system can controls the access authorized data, and to avoid the illegality access. The practicability and robust in the system is evident.
Keywords:role control  RBAC  access control  management of authorization  teaching management
点击此处可从《保鲜与加工》浏览原始摘要信息
点击此处可从《保鲜与加工》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号