Design and implementation of role-based CIMS security model under B/S environment

被引:0
|
作者
Liu, Xiao-Bao [1 ]
Du, Ping-An [1 ,2 ]
机构
[1] School of Mechatronics Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
[2] State Key Laboratory for Manufacturing Systems Engineering, Xi'an 710049, China
关键词
Computer integrated manufacturing - Database systems;
D O I
暂无
中图分类号
学科分类号
摘要
Role-based access control (RBAC) is a major technology in computer integrated manufacturing systems (CIMS)'s security management In this paper, a double-layer RBAC model under B/S environment is presented. In this model, RBAC is applied to both database layer and web container layer. Furthermore, A CIMS security model is established with the help of role-based custom-built menu technology. This security model is applied to all application layers to protect the system resource located at different application layers. Using this security model and the technology of Oracle9i/BES6.5/j2ee, a CIMS's security management system under B/S environment is realized.
引用
收藏
页码:109 / 112
相关论文
共 50 条
  • [21] A role-based hierarchical group collaborative awareness model and its implementation
    Zhu, Jun
    Tang, Yong
    PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 12 - 16
  • [22] Role-Based and Service-Oriented Security Management in the E-Government Environment
    Yu, Chien-Chih
    ELECTRONIC GOVERNMENT, PROCEEDINGS, 2009, 5693 : 364 - 375
  • [23] A role-based security architecture for business intelligence
    Megaache, S
    Karran, T
    Justo, GRR
    TECHNOLOGY OF OBJECT-ORIENTED LANGUAGES AND SYSTEMS - TOOLS 34, PROCEEDINGS, 2000, : 295 - 305
  • [24] Role-based signature and its security proof
    Lin, Changlu (cllin@fjnu.edu.cn), 1600, Institute of Information Science (32):
  • [25] Role-based security for distributed object systems
    Yialelis, N
    Lupu, E
    Sloman, M
    PROCEEDINGS OF THE 5TH WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '96), 1996, : 80 - 85
  • [26] Realizing MAC in role-based security system
    Li, L.X.
    Cao, J.K.
    Chen, W.M.
    Huang, S.L.
    2001, Shenyang Institute of Computing Technology (22):
  • [27] Security analysis in role-based access control
    Purdue University, West Lafayette, IN, United States
    不详
    不详
    不详
    ACM Trans. Inf. Syst. Secur., 2006, 4 (391-420):
  • [28] Role-Based Signature and Its Security Proof
    Luo, Fucai
    Lin, Changlu
    Zhu, Yan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1525 - 1539
  • [29] A role-based and agent-oriented model for collaborative virtual environment
    Yu, CY
    Ye, DY
    Wu, MH
    Pan, YH
    INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOL 1-4, PROCEEDINGS, 2005, : 1592 - 1597
  • [30] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism
    Jiang, Xueying
    Zhang, Chengjun
    Liu, Kean
    Li, Shiyao
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558