Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of University of Shanghai For Science and Technology》 2002-02
Add to Favorite Get Latest Update

Research on management method about authorization in application software

WANG Yu-peng, CAO Qu-jiang (College of Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China)  
A general method with which the manipulator of a software defines authority and distributes authorization is given by use of the relation data model and the design philosophy of UML. At the same time, a concept of system roles is introduced, establishing an authorization mechanism of functions→roles→users. Using the given method, the manipulator of a software can custom the system roles and dispatch the system functions that the role provides. The means of authorization verifying and authority distributing using the given method are provided.
【CateGory Index】: TP311.52
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 2 Hits
1 LI Ying-zhe1, LIU Yan2, LIU Su-ping3, QIN peng-fei2 (1. School of Mechanical and Power Energy Engineering, Shanghai Jiaotong University, Shanghai, 200030; 2. College of Mechanical Engineering, Donghua University, Shanghai, 200051; 3. Information office, Donghua University, Shanghai, 200051);Application of Power Management Based on Function-tree for MIS[J];Journal of Donghua University,Natural Science;2005-05
2 ZHU Shou-ye~(1,3),ZHANG Lei~2,HUANG Fei-jiang~3,LI Xiao-yong~3 (1.Xuzhou Normal University,Xuzhou 221009,China;2.Jiangsu Mining Research Institute,Xuzhou 221006,China; 3.Guangxi Normal University,Guilin 541004,China);Research on Role-based Authority Distribution of Login User in HIS[J];Computer and Modernization;2004-03
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 YANG Ya ping LI Wei qin LIU Huai yu (Beijing University of Aeronautics and Astronautics, Dept. of Computer Science and Engineering);Research and Implementation of Role Based Access Control System[J];Journal of Beijing University of Aeronautics and Astronautics;2001-02
2 L U·· Yi-hong, SONG Han-tao, GONG Yuan-ming (Dept. of Computer Science and Engineering, Beijing Institute of Technology, Beijing100081, China);An Analysis About Role Permission and Role Hierarchy Based on an Improved Role Based Access Control Model[J];Journal of Beijing Institute of Technology;2002-05
3 GUO Xiangfeng,ZHANG Heyi;Study on security of MS SQL Server distributed database[J];Computer and Information Technology;2002-02
4 FANG Li, LIN Zhong da (Department of Power Engineering, Southeast University, Nangjing 210096,China);Methods of VC++ Programming about DLL[J];Journal of Shanghai Institute & Electric Power;2001-04
5 ZHANG Ya-ying,YOU Jin-yuan(Distributed Computing Technology Center, Shanghai Jiaotong University, Shanghai 200030, China);A RBAC Based and Policy Enforcement Coordination Model in Open Distributed System[J];Acta Electronica Sinica;2002-S1
6 CHEN Song 1,LUO Jun 2,LU De wen 3 (1.Computer Science Department, Chongqing Jiaotong University,Chongqing 400074, China; 2.Computer Science College, Chongqing University, Chongqing 400044, China);Application of Changing Dimension and Classifying Power Management to Large-scale MIS[J];Journal of Chongqing University(Natural Science Edition);2002-06
7 ZHANG Shu(Tongji University, Shanghai 200092,China);Status and Future for Informationization of Manufacturing Industry[J];Guangxi Machinery;2003-01
8 ZHU You-chan1, YIN Cheng-qun2, GAO Dan-li3 (l. Center of information and Network Management North China Electric Power University, Baoding 071003, China; 2. Dept. of Electronic and Communication Engineering, North China Electric Power University, Baoding;Role-basted Administration of Authorization Model and its Application[J];Journal of North China Electric Power University;2001-03
9 LIU Min-xian (Aeronautical Computing Technique Research Institute, Xi'an 710068,China);Design and Implementation of data integrity based on SQL Server[J];Aeronautical Computer Technique;2002-02
10 WANG Zhi-gang (Department of Computer, Hunan Normal University,Changsha 410081,China);A Method of Fault Tolerance on Multi-Tier Distributed System[J];Journal of Naturnal Science of Hunan Normal University;2001-02
【Secondary References】
Chinese Journal Full-text Database 7 Hits
1 BU Chun-yuan et al (Department of Electric Engineering,Nanjing Agricultural University,Nanjing,Jiangsu 210031);Design of Management Mechanism about Authorization of Farming Expert System[J];Journal of Anhui Agricultural Sciences;2006-11
2 QIN Jin,LIU Xiao-ping(VCC Division,School of Computer and Information,Hefei University of Technology,Hefei Anhui 230009,China);A Function Solving Method Based on Function Family[J];Journal of Engineering Graphics;2008-05
3 LI Wen,WANG Ming-yan,WANG Wei-li,LI Min (Computer Center of Nanchang University,Nanchang330029,China);Study of Privilege Control Algorithm on Grouping in MIS for Law Execution in Police Department[J];Computer and Modernization;2004-12
4 ZHANG Jie1,MA Li-li1,LOU Ji-dong2,YANG Yang-li1(1.College of Computer & Information Engineering,Inner Mongolia Agricultural University,Huhhot 010018,China;2.The Second Marketing Division of Beijing Division,Zhongxing Telecom Company Limited By Shares,Huhhot 010020,China);STRATEGY SEARCH OF USER AUTHORITY SETTING IN APPLICATION SOFTWARE[J];Journal of Inner Mongolia Agricultural University(Natural Science Edition);2008-02
5 TANG Jing (Department of Basic Computer Teaching,Shenzhen Polytechnic,Shenzhen 518055,China);Design and implementation of role-based rights management middleware[J];Information Technology;2009-08
6 XUE Kai,CUI Du-wu,CUI Ying-an,LIU Ming-ming(School of Computer Science and Engineering,Xi'an University of Technology,Xi'an 710048);Permission Management Based on XML and Database Technology[J];Computer Engineering;2009-20
7 ZHAO Yan-hong(Department of Basic Computer Teaching,Shenzhen Polytechnic,Shenzhen 518055,China);Design and implementation of role-based certification management system[J];Information Technology;2009-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved