O-TRBAC模型在PLM系统中的访问控制权限管理设计与研究
[Abstract]:With the rapid development of computer technology, access control technology is becoming more and more perfect, and access control technology has been applied in more and more fields, including military, commercial or enterprise management systems. Access control technology is an important guarantee of data sharing within or between enterprises, and also an important support for the protection of data security. PLM system is a common management system used in small and medium-sized enterprises at present. The core idea is based on the product life cycle, that is, from the product development, use until the end of the product such a process. The advantage of the PLM system is that it can integrate the information resources related to the product and integrate the resources. Combined with the access control technology, the system defines the relevant constraints and sets the system access rights, so that the system resources are protected reasonably. Based on the actual requirement of parts manufacturing PLM system of a company in Changchun, this paper studies and analyzes the privilege configuration and management of the system. The work of this paper is summarized as follows: (1) the characteristics and security requirements of the management system of small and medium-sized manufacturing enterprises are summarized. This paper introduces the basic ideas and characteristics of several mainstream access control models. (2) combined with the development trend of access control technology, the advantages of RBAC model and TBAC model, as well as the requirements of PLM system itself, a kind of organization architecture is proposed. The O-TRBAC access control model (Organization-Task-based Access Control), which is based on tasks and roles and supports dynamic and dynamic authorization, is described in detail. (3) based on the O-TRBAC model, the basic elements and ideas of the access control model are described in detail. A complete access control mechanism is developed, including user management, definition and division of roles, authorization management and dynamic allocation of permissions according to the project life cycle, and the access level of object resources is set up. Constraints are added to the inheritance of virtual roles, granularity levels are divided according to the controllable scope and attributes of permissions, and time constraints are added to the validity of data and tasks, thus achieving high efficiency and flexibility. (4) the implementation details of authorization configuration and management are given, including application framework, development platform selection, database table structure and so on.
【学位授予单位】:吉林大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP311.52;TP309
【参考文献】
相关期刊论文 前10条
1 彭佳玮;孙国强;杨少友;;基于任务和角色的多粒度动态访问控制模型[J];计算机工程与设计;2016年02期
2 陈学龙;郑洪源;丁秋林;;一种基于TRBAC的动态多级Web服务访问控制模型[J];计算机科学;2014年03期
3 冯俊;王箭;;一种基于T-RBAC的访问控制改进模型[J];计算机工程;2012年16期
4 肖磊;郑培昊;郑勇锋;;基于任务和角色的工作流权限控制研究与实现[J];电力信息化;2011年07期
5 倪东英;张晓丽;;基于RBAC的用户权限管理的设计与实现[J];济南大学学报(自然科学版);2010年02期
6 朱州;张沪寅;;一种基于T-RBAC的上下文相关访问控制模型[J];武汉大学学报(理学版);2009年02期
7 孟亚辉;;浅谈软件项目开发过程中的需求分析[J];科技信息;2009年11期
8 吴江栋;李伟华;安喜锋;;基于RBAC的细粒度访问控制方法[J];计算机工程;2008年20期
9 王命延;彭建文;;T-RBAC访问控制模型及其约束描述语言[J];南昌大学学报(理科版);2007年03期
10 陈明忠;;基于角色访问控制模型的应用研究[J];电脑与电信;2007年05期
相关博士学位论文 前3条
1 罗鑫;访问控制技术与模型研究[D];北京邮电大学;2009年
2 胡亚辉;基于PDM/PLM的平台式CAPP系统若干关键技术研究[D];天津大学;2005年
3 于万钧;工作流管理技术研究[D];吉林大学;2004年
相关硕士学位论文 前10条
1 朱玉凤;PDM系统中访问控制模型的研究与应用[D];吉林大学;2015年
2 向奎;基于RBAC的用户权限管理系统的设计和实现[D];武汉理工大学;2013年
3 王丹;基于TRBAC的工作流访问控制模型的研究与应用[D];华北电力大学;2012年
4 甘剑;基于角色的访问机制的研究及应用[D];中南大学;2010年
5 初皆超;面向中小型制造业企业的进销存系统的研究与开发[D];大连交通大学;2009年
6 罗安德;基于任务和角色的访问控制模型的研究与应用[D];浙江工商大学;2009年
7 李华;基于任务和角色的CAD模型访问控制研究[D];浙江大学;2008年
8 郭艳灵;PDM中基于RBAC的权限控制的研究与实现[D];大连理工大学;2006年
9 戴莹莹;B/S结构的OA系统中基于角色访问控制模型研究与实现[D];武汉理工大学;2006年
10 刘梅;基于任务和角色的双重访问控制模型及其应用研究[D];中国海洋大学;2005年
,本文编号:2255684
本文链接:https://www.wllwen.com/shoufeilunwen/xixikjs/2255684.html