2 October 2006 The research and scheme of RBAC using J2EE security mechanisms
Author Affiliations +
Proceedings Volume 6390, Broadband Access Communication Technologies; 63900L (2006) https://doi.org/10.1117/12.685797
Event: Optics East 2006, 2006, Boston, Massachusetts, United States
Access control based on RBAC makes the system suitable to the security strategy for special application, relieves burden of system administrators and can adapt itself to the adjustment of the system structure flexibly. But all the existing security mechanisms of the middleware technology can't support the RBAC model very well. The method using J2EE security mechanisms to support RBAC is showed in this paper. First, the configuration of J2EE security systems is given in the paper and the algorithm of J2EE authorization decision is designed. Then, the language of J2EE security description is used to define RBAC, and realization of the requirement of J2EE security service is given. It has achieved the anticipative effect in virtue of deployment and application on the platform of the national science technology infrastructure.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Fangzhou Zhang, Fangzhou Zhang, Xiaoyu Sheng, Xiaoyu Sheng, Yingying Niu, Yingying Niu, Fengpin Wang, Fengpin Wang, Han Zhang, Han Zhang, } "The research and scheme of RBAC using J2EE security mechanisms", Proc. SPIE 6390, Broadband Access Communication Technologies, 63900L (2 October 2006); doi: 10.1117/12.685797; https://doi.org/10.1117/12.685797


Security architecture of the M&M mobile agent framework
Proceedings of SPIE (July 11 2001)
Survey of cyber security issues in smart grids
Proceedings of SPIE (April 28 2010)
Analysis of security mechanism in EPONs
Proceedings of SPIE (November 18 2007)
Designing and validating the joint battlespace infosphere
Proceedings of SPIE (August 28 2001)
Firewall systems: the next generation
Proceedings of SPIE (January 02 1996)
Information risk and security modeling
Proceedings of SPIE (March 27 2005)

Back to Top