State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China;EBUPT Information Technology Co. Ltd., Beijing 100191, China 在期刊界中查找 在百度中查找 在本站中查找
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China;EBUPT Information Technology Co. Ltd., Beijing 100191, China 在期刊界中查找 在百度中查找 在本站中查找
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China;EBUPT Information Technology Co. Ltd., Beijing 100191, China 在期刊界中查找 在百度中查找 在本站中查找
The article researches models based on RBAC, and then introduces several design principles, aiming to solve the security problems of a web system. Finally, the article designs an extended privilege management model in a real project using the structure of FleaPHP.
1 David F. Ferraiolo, Richard Kuhn D. Role-Based Access Controls.15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992:554-563.
2 Ravi S. Sandhu, Edward J. Coynek, Hal L. Feinsteink, Charles E. Youmank. Role-Based Access Control Models. IEEE Computer,1996,29(2):38-47.
3 Ping Ni, Jianxin Liao, Chun Wang, Keyan Ren. Web information recommendation based on user behaviors. 2009 WRI World Congress on Computer Science and Information Engineering. 2009.3.31-2009:426-430.
5 Ferraiolo DF, Barkley J, Kuhn DR. A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. ACM Trans. on Information Sys- tems Security, February 1999,1(2).