Design and implementation of role-based CIMS security model under B/S environment

被引:0
|
作者
Liu, Xiao-Bao [1 ]
Du, Ping-An [1 ,2 ]
机构
[1] School of Mechatronics Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
[2] State Key Laboratory for Manufacturing Systems Engineering, Xi'an 710049, China
关键词
Computer integrated manufacturing - Database systems;
D O I
暂无
中图分类号
学科分类号
摘要
Role-based access control (RBAC) is a major technology in computer integrated manufacturing systems (CIMS)'s security management In this paper, a double-layer RBAC model under B/S environment is presented. In this model, RBAC is applied to both database layer and web container layer. Furthermore, A CIMS security model is established with the help of role-based custom-built menu technology. This security model is applied to all application layers to protect the system resource located at different application layers. Using this security model and the technology of Oracle9i/BES6.5/j2ee, a CIMS's security management system under B/S environment is realized.
引用
收藏
页码:109 / 112
相关论文
共 50 条
  • [31] Study on role-based IT strategy implementation mechanism
    Hao, XL
    Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 187 - 191
  • [32] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [33] Implementation model of CIMS network design aid tool
    Gu, Boxuan
    Peng, Jing
    Ma, Xiaodong
    Shen, Subin
    Yi, Sheng
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 1999, 5 (06): : 36 - 40
  • [34] Role-based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE)
    Reith, Mark
    Niu, Jianwei
    Winsborough, William H.
    ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2008, : 929 - 930
  • [35] Design and Implementation of a Context-Based Security Model
    Iijima, Tadashi
    Kido, Satoshi
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014, 2014, 466 : 356 - 370
  • [36] ACCESS RIGHTS ADMINISTRATION IN ROLE-BASED SECURITY SYSTEMS
    NYANCHAMA, M
    OSBORN, SL
    DATABASE SECURITY, VIII: STATUS AND PROSPECTS, 1994, 60 : 37 - 56
  • [37] Extended role-based access control model supporting authorization for collaboration environment
    Liu, TT
    Zhang, YL
    Wang, HF
    Proceedings of the International Conference on Mechanical Engineering and Mechanics 2005, Vols 1 and 2, 2005, : 1238 - 1243
  • [38] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [39] Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments
    Kuang, Teo Poh
    Ibrahim, Hamidah
    PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 553 - 559
  • [40] A Trusted Role-Based Access Control Model for Dynamic Collaboration in a Federated Environment
    Lianzhong, Liu
    Peng, Liu
    2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 181 - 186