O-TRBAC模型在PLM系統(tǒng)中的訪問控制權(quán)限管理設(shè)計與研究
[Abstract]:With the rapid development of computer technology, access control technology is becoming more and more perfect, and access control technology has been applied in more and more fields, including military, commercial or enterprise management systems. Access control technology is an important guarantee of data sharing within or between enterprises, and also an important support for the protection of data security. PLM system is a common management system used in small and medium-sized enterprises at present. The core idea is based on the product life cycle, that is, from the product development, use until the end of the product such a process. The advantage of the PLM system is that it can integrate the information resources related to the product and integrate the resources. Combined with the access control technology, the system defines the relevant constraints and sets the system access rights, so that the system resources are protected reasonably. Based on the actual requirement of parts manufacturing PLM system of a company in Changchun, this paper studies and analyzes the privilege configuration and management of the system. The work of this paper is summarized as follows: (1) the characteristics and security requirements of the management system of small and medium-sized manufacturing enterprises are summarized. This paper introduces the basic ideas and characteristics of several mainstream access control models. (2) combined with the development trend of access control technology, the advantages of RBAC model and TBAC model, as well as the requirements of PLM system itself, a kind of organization architecture is proposed. The O-TRBAC access control model (Organization-Task-based Access Control), which is based on tasks and roles and supports dynamic and dynamic authorization, is described in detail. (3) based on the O-TRBAC model, the basic elements and ideas of the access control model are described in detail. A complete access control mechanism is developed, including user management, definition and division of roles, authorization management and dynamic allocation of permissions according to the project life cycle, and the access level of object resources is set up. Constraints are added to the inheritance of virtual roles, granularity levels are divided according to the controllable scope and attributes of permissions, and time constraints are added to the validity of data and tasks, thus achieving high efficiency and flexibility. (4) the implementation details of authorization configuration and management are given, including application framework, development platform selection, database table structure and so on.
【學(xué)位授予單位】:吉林大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP311.52;TP309
【參考文獻】
相關(guān)期刊論文 前10條
1 彭佳瑋;孫國強;楊少友;;基于任務(wù)和角色的多粒度動態(tài)訪問控制模型[J];計算機工程與設(shè)計;2016年02期
2 陳學(xué)龍;鄭洪源;丁秋林;;一種基于TRBAC的動態(tài)多級Web服務(wù)訪問控制模型[J];計算機科學(xué);2014年03期
3 馮俊;王箭;;一種基于T-RBAC的訪問控制改進模型[J];計算機工程;2012年16期
4 肖磊;鄭培昊;鄭勇鋒;;基于任務(wù)和角色的工作流權(quán)限控制研究與實現(xiàn)[J];電力信息化;2011年07期
5 倪東英;張曉麗;;基于RBAC的用戶權(quán)限管理的設(shè)計與實現(xiàn)[J];濟南大學(xué)學(xué)報(自然科學(xué)版);2010年02期
6 朱州;張滬寅;;一種基于T-RBAC的上下文相關(guān)訪問控制模型[J];武漢大學(xué)學(xué)報(理學(xué)版);2009年02期
7 孟亞輝;;淺談軟件項目開發(fā)過程中的需求分析[J];科技信息;2009年11期
8 吳江棟;李偉華;安喜鋒;;基于RBAC的細粒度訪問控制方法[J];計算機工程;2008年20期
9 王命延;彭建文;;T-RBAC訪問控制模型及其約束描述語言[J];南昌大學(xué)學(xué)報(理科版);2007年03期
10 陳明忠;;基于角色訪問控制模型的應(yīng)用研究[J];電腦與電信;2007年05期
相關(guān)博士學(xué)位論文 前3條
1 羅鑫;訪問控制技術(shù)與模型研究[D];北京郵電大學(xué);2009年
2 胡亞輝;基于PDM/PLM的平臺式CAPP系統(tǒng)若干關(guān)鍵技術(shù)研究[D];天津大學(xué);2005年
3 于萬鈞;工作流管理技術(shù)研究[D];吉林大學(xué);2004年
相關(guān)碩士學(xué)位論文 前10條
1 朱玉鳳;PDM系統(tǒng)中訪問控制模型的研究與應(yīng)用[D];吉林大學(xué);2015年
2 向奎;基于RBAC的用戶權(quán)限管理系統(tǒng)的設(shè)計和實現(xiàn)[D];武漢理工大學(xué);2013年
3 王丹;基于TRBAC的工作流訪問控制模型的研究與應(yīng)用[D];華北電力大學(xué);2012年
4 甘劍;基于角色的訪問機制的研究及應(yīng)用[D];中南大學(xué);2010年
5 初皆超;面向中小型制造業(yè)企業(yè)的進銷存系統(tǒng)的研究與開發(fā)[D];大連交通大學(xué);2009年
6 羅安德;基于任務(wù)和角色的訪問控制模型的研究與應(yīng)用[D];浙江工商大學(xué);2009年
7 李華;基于任務(wù)和角色的CAD模型訪問控制研究[D];浙江大學(xué);2008年
8 郭艷靈;PDM中基于RBAC的權(quán)限控制的研究與實現(xiàn)[D];大連理工大學(xué);2006年
9 戴瑩瑩;B/S結(jié)構(gòu)的OA系統(tǒng)中基于角色訪問控制模型研究與實現(xiàn)[D];武漢理工大學(xué);2006年
10 劉梅;基于任務(wù)和角色的雙重訪問控制模型及其應(yīng)用研究[D];中國海洋大學(xué);2005年
,本文編號:2255684
本文鏈接:http://www.lk138.cn/shoufeilunwen/xixikjs/2255684.html