- 1、本文档共57页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
分布式系统安全访问控制问题的分析-计算机软件与理论专业论文
II
II
Abstract
The system security issue has been a hot and difficult issue in the system research field, it is particularly important especially in a distributed environment. This paper will conduct depth research on security access control method in the distributed system. Access control is an important measure to guarantee the security of a system, can restrict the rights of users to access the system resources, in order to prevent the illegal users to access resources or the security problems caused by the misoperations of legitimate users. Role-based access control has become a research hotspot in the field of access control in recent years; it realizes the logic separation from users to permissions through the introduction of roles.
To complete some larger tasks, the resources need to be frequently accessed by other computers. In order to ensure the access between distributed systems to be more secure and effective, the foreign visitors need to be granted the appropriately permissions in this system. This paper analyzes the existing problems of the access control in distributed environment, then improves the existing deficiencies in the role inheritance according to these problems, and describes a way to achieve cross-domain authorization based on the further refinement permissions, which can resolve the security problems of resource exchange access between systems.
At present, the modeling of software system usually does not consider the security policies and security mechanisms, this leads to a lot of security risks in such aspects as security maintenance and system integration during the late development of systems. This paper explores a kind of methods which can integrate RBAC features into the system, At the same time, the traditional access control lists have the following disadvantages: descriptive low, not enough flexibility, and difficult to transmit between different systems, etc., it is difficult to meet the access control demands of the system. The
您可能关注的文档
- 典型管路系统抗冲击性能分析方法新型抗冲击元器件设计分析-船舶与海洋结构物设计制造专业论文.docx
- 典型红壤丘陵区地地利用变化对土壤CO2和CH4通量的影响研究-环境工程专业论文.docx
- 典型纳米功能材料在环境污染控制领域的应用研究-环境科学专业论文.docx
- 典型自动铺放系统的机构改进及CAM技术研究-材料加工工程专业论文.docx
- 典型结构薄壁铝合金铸件的工艺设计和优化-材料学专业论文.docx
- 典型耐压船体开孔加强结构优化设计-船舶与海洋工程专业论文.docx
- 典型结构在单轴与三轴随机振动下的动力学响应对比分析-机械工程专业论文.docx
- 典型航空液压管路的流固耦合动力学分析-机械电子工程专业论文.docx
- 典型船用氢燃料电池动力系统特性测试分析-船舶与海洋工程专业论文.docx
- 典型船体拐角结构的疲劳评估方法研究-船舶与海洋工程专业论文.docx
文档评论(0)