Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering》 2006-01
Add to Favorite Get Latest Update

Research of Access Control Based on Multi-mode

ZHANG Zuping,WANG Lei(School of Information Science & Engineering,Central South University,Changsha 410083)  
The paper mainly studies the technologies of access control in MIS based on both C/S and B/S modes.It synthetically takes consideration of their common points in the design and realization.In view of the characteristics of multi-user operations and different menus for different users etc in present MIS,the paper proposes a general strategy and method of role-based access control on application layer and discusses universally concrete designing and realizing technologies.
【Fund】: 国家“863”/CIMS计划基金资助项目(863-511-910-092)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 10 Hits
1 WANG Wen (Chanzhou Institute of Technology,Chanzhou 213002);Design and Application of Dynamic Menu Based on DELPHI[J];Journal of Changzhou Institute of Technology;2008-03
2 LI Wei(Electronic Information and Engineering College of Tongji University,Shanghai 201804,China);Access Control of Logistics System with Improved RBAC[J];Computer Security;2010-10
3 ZHANG Chen-xi1, LI Jiang-feng2, LIU Yi1, ZHAO Wei-dong3 (1. School of Software Engineering, Tongji University, Shanghai 200092; 2. School of Electronics and Information Engineering, Tongji University, Shanghai 200092; 3. Computing Center, Shanghai University of Engineering Science, Shanghai 201620);Design and Implementation of Universal Management System Based on Roles and Scopes[J];Computer Engineering;2008-07
4 Feng Xiang Gan Ling Ni Kai Zhang Chao(Key Laboratory of Geography-Information Science Ministry of Education,East China Normal University,Shanghai 200062,China);WEB SERVICE BASED AUTHORIZATION ACCESS CONTROL METHOD[J];Computer Applications and Software;2007-10
5 Li Xin Li Jianming(1.College of Information Engineering, Nanchang University, Jiangxi Nanchang 330031; 2.Information Engineering, Nanchang University, Jiangxi Nanchang 330031 );the Design and Application of the Web System Right Control and Authority based on Struts[J];Science Mosaic;2007-09
6 YUAN Qiang and JIANG Bo;Thoughts on Design of Pre-college Medical Checkup Information System Based on Network Environment[J];China Examinations;2011-05
7 XIANG Jun;WENG Jian-guo;HU Jun-peng;School of Information and Engineering,Hubei University of Nationalities;;Research on the Security Policy Mechanism in Enshi Tourism Network Based on RBAC[J];Journal of Hubei University for Nationalities(Natural Science Edition);2013-03
8 Zhang Qi Yu Lei School of Computer Science and Engineering,South China University of Technology,Guangdong 510640,China;The Design and Implementation of Configurable Privilege Management Systme Based on J2EE Platform[J];Information and Communications Technologies;2008-06
9 PEI Si,ZHANG Zu-ping,LIU Shao-bin (School of Information Science and Engineering,Central South University,Changsha,Hunan 410083,China);Based on revocation symmetric administrative model of the delegation role-base access control[J];Technological Development of Enterprise;2009-07
10 ZHANG Shi-ming,YANG Yin-chun(Shanghai Second Polytechnic University,Shanghai 201209,China);Application of role based safe access control in large system[J];Computer Engineering and Design;2006-19
【Citations】
Chinese Journal Full-text Database 2 Hits
1 Li Songtao Li Chunwen Sun Zhengshun(Automation Department ,Tsinghua University,Beijing100084);A New Access Control Method of B/S System[J];Computer Engineering and Applications;2002-01
2 DONG Lehong,GENG Guohua,ZHOU Mingquan (Department of Computer Science, Northwest University, Xi'an 710069);Design of Web MIS Authority Control System Based on ASP[J];Computer Engineering;2003-10
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 FAN Yin-ting WANG Chun-qing ZHOU De-xiang (Henan University of Technology,Zhengzhou 450007);Research and Implementation of An Extended Role-based Access Control Model[J];;2006-03
2 ZHOU Min ZHANG Wei-dong(Schoof of Computer and Software,Changzhou College of Information Technology,Changzhou 213164,China);The Privilege Control Model Based on Binary Bitwise Logical Operation[J];Journal of Changzhou Vocational College of Information Technology;2009-06
3 Wang Jian,Yang Liusong(College of Information and Computer Engineering,Northeast Forestry University,Harbin 150040,P.R.China);Authority Design of Web Application System for Digital Forestry Based on User Group[J];Journal of Northeast Forestry University;2008-08
4 CHEN Hua-peng1,SHEN Yin-yue2(1.Zhejiang Technology Institute of Economy, Hangzhou 310018, China; 2.Hangzhou Vocation Technology College, Hangzhou 310018, China);Patterns Design in Motor Insurance selling Web-based System[J];Computer Knowledge and Technology;2006-35
5 WANG Wen-ju, SAN Yi-xian, LIU Jie(China University of Petroleum, Dongying 257061, China);Realization of Right Management in Budget System for Oil and Gas Production[J];Computer Knowledge and Technology(Academic Exchange);2007-04
6 ZHENG Pei-xu1, WU De-xiong2, LUO Jian1, WU Fa-cheng1 (1.Department of Automation, Xiamen University, Xiamen 361005, China; 2.Fujian Coal and Electricity Group Limited, Longyan 364014, China);The Research and Implementation about Component's Authorization Control Based on RBAC[J];Computer Knowledge and Technology;2010-28
7 LIU-Lijuan,GUO-Shanshan,ZHENG-Fengbin,LIU-Dingyi (Department of Computer Science and Engineering,HeNan University,Henan Kaifeng 475004);A Study on the Role Hierarchy Access Control based on Neural Network[J];CD Technology;2008-08
8 LIU Xin-qiang1,ZENG Bing-yi2(1.Electronic Information Department,Xi' an Railway Vocational &Technical Institute,Xi'an 710014,China; 2.Shaanxi Kaituozhe Software co.,LTD,Xi'an 710052,China);An optimization model of RBAC applications in the ERP system of large coal mine[J];Electronic Design Engineering;2013-05
9 GAO Fa-gui~1,GAO Lu~2,XU Kai-peng~1 (1.College of Information Engineering,Hubei Institute for Nationalities, Enshi 445000, China; 2.College of Computer Science, Wuhan University,Wuhan 430072, China);Design of Web MIS Security Framework Based on ASP[J];Journal of Hubei Institute For Nationalities;2005-01
10 HU Jun-peng,XIE Kun-wu(School of Information Engineering,Hubei Institute for Nationalities,Enshi 445000,China);Research on Role-based Access Control System[J];Journal of Hubei Institute for Nationalities(Natural Science Edition);2007-02
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 LI Junguo ZHANG Li'ang (Dept of Computer Science and Technology,Peking University,Beijing,100871, E-mail:lijg@theory.cs.pku.edu.cn,zliang@pku.edu.cn);A XML Based Presentation Technique for Mathematical Expressions on Web Page[J];Acta Scicentiarum Naturalum Universitis Pekinesis;2003-05
2 ZHANG Li-ming, RAN Yu-jing, LU An, LI Bao-quan (College of Electronic Information and Control Engineering, Beijing University of Technology, Beijing 100022, China);The Design and Application of Dynamic Menu Based on VB[J];Journal of Beijing Polytechnic University;2005-05
3 YANG Ya ping LI Wei qin LIU Huai yu (Beijing University of Aeronautics and Astronautics, Dept. of Computer Science and Engineering);Research and Implementation of Role Based Access Control System[J];Journal of Beijing University of Aeronautics and Astronautics;2001-02
4 SONG Wei~1,ZHENG Hong-wei~2(1.Registrar's Office,Beijing Agricultural College,Beijing 102206,China;2.Department of Mechanical Engineering National University of Singapore,119260 Singapore);The Construction of Cluster underLinux[J];Journal of Beijing Agricultural College;2006-02
5 LV Xiao-qi,WANG Lei,YANG Li-dong(Information Engineering School,Inner Mongolia University of Science and Technology,Baotou 014010,China);Research and implementation of the medical information privilege distribution system based on RBAC[J];Journal of Inner Mongolia University of Science and Technology;2011-01
6 ZHOU Rong GONG Xiao-li (Sichuan Vocational & Technical College, Suining, Sichuan, 629000);The Application of ASP. NET Security Identity Verification Technology[J];Journal of Northern Sichuan Education College;2004-04
7 ZHU Jiang~(1,2),SONG Guan-fu~(1,2),ZHONG Er-shun~(1,2),ZHANG Ji-nan~2, LI Wei-gu~2,HU Zhong-nan~2(1.Geoinformation Iudustry Development Center of CAS,Beijing 100101,China;2.Beijing SuperMap Geo-information Technology Co.Ltd.,Beijing 150085,China);Research on a New Generation of Web GIS Based onWeb Services and .NET Technologies[J];Geomatics World;2004-02
8 SHEN Ya-ning (Hunan Computer Company,Changsha 410007,China);Design and Implementation of Online Project Report System[J];Journal of Changsha University of Electric Power(Natural Science);2005-01
9 YANG Jing,TENG Gui-fa,WANG Chun-shan(School of Information Science and Technology,Agricultural University of Hebei,Baoding 071001,China);A workflow access control base on task-status oriented RBAC algorithm in document flow[J];Journal of Agricultural University of Hebei;2007-02
10 YUAN Jun-ru~1,HUANG Wei-wei~2,LIU Dong-lin~2(1.College of Machinery and Electricity,China University of Mining Industry,Beijing 100083,China;2.RS Application Institute of CAS,Beijing 100000,China);The Visualization of Statistic Data in the Second Exploitation of WebGIS[J];Geomatics & Spatial Information Technology;2005-02
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 WANG Sha1,2,HUANG Zhi-Wu1 (1.College of Information Science and Engineering,Central South University,Changsha 410083,China;2.Department of Electric and Engineering,Hunan International Economics University,Changsha 410205,China);Role-Based Access Control[J];Computer Knowledge and Technology(Academic Exchange);2007-03
2 SHI Ji-tao(94362 PLA Troops,Qingdao 266111,China);Security Solution Design and Realization for Web-based Application[J];Computer Knowledge and Technology;2011-05
3 ZHANG Guo-ping,MA Li (Software College,Pingdingshan University,Pingdingshan 467000,China);Spring Acegi integrated security framework in J2EE application[J];Electronic Design Engineering;2012-07
4 HUA Cheng-jun1,2,FAN Wei2,ZHANG Sheng-mao2(1.Dalian Ocean University,Dalian 116023,China,2.Key Laboratory of Fisheries Resources Remote Sensing andInformation Technology Resources,East China Sea Fisheries Research Institute,Chinese Academy of Fishery Sciences,Shanghai 200090,China);User Privilege Management Based on Role and Function Modules Dynamicly Loaded[J];Computer Development & Applications;2012-08
5 GUAN Wen(GIS,Liaoning Normal University,Dalian 116029,China);The Realization of Dynamic Authority Management Based on Menu Controlling[J];Computer Knowledge and Technology;2013-11
6 GUAN Wen(Liaoning Normal University,Liaoning Dalian 116029,China);The Realization of Dynamic Menu Based on Access Authority Website[J];Computer Programming Skills & Maintenance;2013-12
7 LI Zhu-lin1,2,MA Yan1,2(1.Institute of Computer Science,Yan'an University,Yan'an 716000,China; 2.Study and Development Center for Software,Yan'an University,Yan'an 716000,China);Design and application of dynamic allocation scheme for business based on hierarchical control[J];Information Technology;2012-05
8 LI Jian,MO Rong,CHANG Zhi-yong ( The Key Laboratory of Contemporary Design and Integrated Manufacturing Technology,Ministry of Education, Northwestern Polytechnical Univ. ,Xi′an 710072,China);Study on Key Technology about the Quickly Check for CAD Model Quality and Standard[J];Aeronautical Computing Technique;2010-03
9 DENG Li1,WANG Bo-min1,LI Qing-xiang1,YIN Xin-huai2(1.National Meteorological Information Center,Beijing 100081,China;2.Hunan Provincial Meteorological Information Center,Changsha 410119,China);Application of Data Access Control in Meteorological Information Service Platform[J];Computer Engineering;2011-S1
10 JIN Li-zhong;Analysis on the Encryption Technology for Key Data on Enterprise's Special Network[J];Sci-Tech Information Development & Economy;2008-06
China Proceedings of conference Full-text Database 3 Hits
1 Tian Yue~1 Zhang Jian~2 Yang Zhengqiu~3 (Beijing Key Lab of Intelligent Telecomm Software and Multimedia,School of CST,Beijing University of Posts and Telecommunications,Beijing 100876,China);Web System's Improved Authorization Validation Based on Struts Frame[A];[C];2008
2 Cao Xingwang~1 YangZhengqiu~2 (Beijing Key Lab of Intelligent Telecomm Software and Multimedia,School of CST,Beijing University of Posts and Telecommunications,Beijing100876,China;A Design of Configuration Management Based on Struts Frame[A];[C];2008
3 Ye Yunfang~1 Yang Yu~2 Luo Xin~3 Xu Guoai~4 (Digital Content Research Center,Key Laboratory of Information Processing and Intelligent Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);A Fine-Grained Authorization on Appfuse[A];[C];2008
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Dong Hao(Department of Computer Science and Engineering, Yantai University, Yantai 264005);Study on Security of MIS[J];JOURNAL OF YANTAI UNIVERSITY;1997-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved