Paper
2 October 2006 The research and scheme of RBAC using J2EE security mechanisms
Fangzhou Zhang, Xiaoyu Sheng, Yingying Niu, Fengpin Wang, Han Zhang
Author Affiliations +
Proceedings Volume 6390, Broadband Access Communication Technologies; 63900L (2006) https://doi.org/10.1117/12.685797
Event: Optics East 2006, 2006, Boston, Massachusetts, United States
Abstract
Access control based on RBAC makes the system suitable to the security strategy for special application, relieves burden of system administrators and can adapt itself to the adjustment of the system structure flexibly. But all the existing security mechanisms of the middleware technology can't support the RBAC model very well. The method using J2EE security mechanisms to support RBAC is showed in this paper. First, the configuration of J2EE security systems is given in the paper and the algorithm of J2EE authorization decision is designed. Then, the language of J2EE security description is used to define RBAC, and realization of the requirement of J2EE security service is given. It has achieved the anticipative effect in virtue of deployment and application on the platform of the national science technology infrastructure.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Fangzhou Zhang, Xiaoyu Sheng, Yingying Niu, Fengpin Wang, and Han Zhang "The research and scheme of RBAC using J2EE security mechanisms", Proc. SPIE 6390, Broadband Access Communication Technologies, 63900L (2 October 2006); https://doi.org/10.1117/12.685797
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Control systems

Systems modeling

Network security

Telecommunications

Information operations

Security technologies

Back to Top