网站大量收购闲置独家精品文档,联系QQ:2885784924

分布式系统安全访问控制问题的分析-计算机软件与理论专业论文.docx

分布式系统安全访问控制问题的分析-计算机软件与理论专业论文.docx

  1. 1、本文档共57页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
分布式系统安全访问控制问题的分析-计算机软件与理论专业论文

II II Abstract The system security issue has been a hot and difficult issue in the system research field, it is particularly important especially in a distributed environment. This paper will conduct depth research on security access control method in the distributed system. Access control is an important measure to guarantee the security of a system, can restrict the rights of users to access the system resources, in order to prevent the illegal users to access resources or the security problems caused by the misoperations of legitimate users. Role-based access control has become a research hotspot in the field of access control in recent years; it realizes the logic separation from users to permissions through the introduction of roles. To complete some larger tasks, the resources need to be frequently accessed by other computers. In order to ensure the access between distributed systems to be more secure and effective, the foreign visitors need to be granted the appropriately permissions in this system. This paper analyzes the existing problems of the access control in distributed environment, then improves the existing deficiencies in the role inheritance according to these problems, and describes a way to achieve cross-domain authorization based on the further refinement permissions, which can resolve the security problems of resource exchange access between systems. At present, the modeling of software system usually does not consider the security policies and security mechanisms, this leads to a lot of security risks in such aspects as security maintenance and system integration during the late development of systems. This paper explores a kind of methods which can integrate RBAC features into the system, At the same time, the traditional access control lists have the following disadvantages: descriptive low, not enough flexibility, and difficult to transmit between different systems, etc., it is difficult to meet the access control demands of the system. The

您可能关注的文档

文档评论(0)

peili2018 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档