Design and implementation of role-based CIMS security model under B/S environment

被引:0
|
作者
Liu, Xiao-Bao [1 ]
Du, Ping-An [1 ,2 ]
机构
[1] School of Mechatronics Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
[2] State Key Laboratory for Manufacturing Systems Engineering, Xi'an 710049, China
关键词
Computer integrated manufacturing - Database systems;
D O I
暂无
中图分类号
学科分类号
摘要
Role-based access control (RBAC) is a major technology in computer integrated manufacturing systems (CIMS)'s security management In this paper, a double-layer RBAC model under B/S environment is presented. In this model, RBAC is applied to both database layer and web container layer. Furthermore, A CIMS security model is established with the help of role-based custom-built menu technology. This security model is applied to all application layers to protect the system resource located at different application layers. Using this security model and the technology of Oracle9i/BES6.5/j2ee, a CIMS's security management system under B/S environment is realized.
引用
收藏
页码:109 / 112
相关论文
共 50 条
  • [1] Design and implementation of warehouse management system under CIMS environment
    Yin, CH
    Gu, PL
    Chen, L
    NEW TRENDS OF INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT IN NEW CENTURY, 2001, : 523 - 525
  • [2] Role-Based Collaboration Model of Security Devices
    Liu Bing
    Song Cheng
    Xin Yang
    Yang Yixian
    Wang Shaobin
    Wei Jiwei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4581 - +
  • [3] Analysis, comparison and design of role-based security specifications
    Universita di Milano, Milano, Italy
    Data Knowl Eng, 1 (31-55):
  • [4] Analysis, comparison and design of role-based security specifications
    Castano, S
    Martella, G
    Samarati, P
    DATA & KNOWLEDGE ENGINEERING, 1996, 21 (01) : 31 - 55
  • [5] A role-based infrastructure management system: design and implementation
    Shin, D
    Ahn, GJ
    Cho, S
    Jin, S
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11): : 1121 - 1141
  • [6] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [7] Research and implementation of role-based RBAC administration model
    Qiu, J
    Ma, CH
    Yin, JW
    Dong, JX
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 746 - 750
  • [8] ROLE-BASED NETWORK SECURITY
    JOLITZ, WF
    JOLITZ, LG
    DR DOBBS JOURNAL, 1995, 20 (05): : 80 - &
  • [9] Role-based security policy
    Ma, Jianping
    Yu, Xiangxuan
    Hong, Fan
    Zhang, Jiangling
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 35 (05): : 447 - 450
  • [10] A dynamic role-based authorization model in grid environment
    Sun, Weifeng
    Guo, Cheng
    Zhang, Peng
    Zhang, Ning
    Wang, Haotian
    Journal of Digital Information Management, 2011, 9 (06): : 242 - 248