
Proceedings Paper
The research and scheme of RBAC using J2EE security mechanismsFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
Access control based on RBAC makes the system suitable to the security strategy for special application, relieves
burden of system administrators and can adapt itself to the adjustment of the system structure flexibly. But all the
existing security mechanisms of the middleware technology can't support the RBAC model very well. The method
using J2EE security mechanisms to support RBAC is showed in this paper. First, the configuration of J2EE security
systems is given in the paper and the algorithm of J2EE authorization decision is designed. Then, the language of J2EE
security description is used to define RBAC, and realization of the requirement of J2EE security service is given. It has
achieved the anticipative effect in virtue of deployment and application on the platform of the national science
technology infrastructure.
Paper Details
Date Published: 2 October 2006
PDF: 7 pages
Proc. SPIE 6390, Broadband Access Communication Technologies, 63900L (2 October 2006); doi: 10.1117/12.685797
Published in SPIE Proceedings Vol. 6390:
Broadband Access Communication Technologies
Raj Jain; Benjamin B. Dingel; Shozo Komaki; Shlomo Ovadia, Editor(s)
PDF: 7 pages
Proc. SPIE 6390, Broadband Access Communication Technologies, 63900L (2 October 2006); doi: 10.1117/12.685797
Show Author Affiliations
Fangzhou Zhang, Daqing Petroleum Institute (China)
Xiaoyu Sheng, Daqing Petroleum Institute (China)
Yingying Niu, Daqing Petroleum Institute (China)
Xiaoyu Sheng, Daqing Petroleum Institute (China)
Yingying Niu, Daqing Petroleum Institute (China)
Fengpin Wang, Daqing Petroleum Institute (China)
Han Zhang, Daqing Petroleum Institute (China)
Han Zhang, Daqing Petroleum Institute (China)
Published in SPIE Proceedings Vol. 6390:
Broadband Access Communication Technologies
Raj Jain; Benjamin B. Dingel; Shozo Komaki; Shlomo Ovadia, Editor(s)
© SPIE. Terms of Use
