Share Email Print

Proceedings Paper

The research and scheme of RBAC using J2EE security mechanisms
Author(s): Fangzhou Zhang; Xiaoyu Sheng; Yingying Niu; Fengpin Wang; Han Zhang
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Access control based on RBAC makes the system suitable to the security strategy for special application, relieves burden of system administrators and can adapt itself to the adjustment of the system structure flexibly. But all the existing security mechanisms of the middleware technology can't support the RBAC model very well. The method using J2EE security mechanisms to support RBAC is showed in this paper. First, the configuration of J2EE security systems is given in the paper and the algorithm of J2EE authorization decision is designed. Then, the language of J2EE security description is used to define RBAC, and realization of the requirement of J2EE security service is given. It has achieved the anticipative effect in virtue of deployment and application on the platform of the national science technology infrastructure.

Paper Details

Date Published: 2 October 2006
PDF: 7 pages
Proc. SPIE 6390, Broadband Access Communication Technologies, 63900L (2 October 2006); doi: 10.1117/12.685797
Show Author Affiliations
Fangzhou Zhang, Daqing Petroleum Institute (China)
Xiaoyu Sheng, Daqing Petroleum Institute (China)
Yingying Niu, Daqing Petroleum Institute (China)
Fengpin Wang, Daqing Petroleum Institute (China)
Han Zhang, Daqing Petroleum Institute (China)

Published in SPIE Proceedings Vol. 6390:
Broadband Access Communication Technologies
Raj Jain; Benjamin B. Dingel; Shozo Komaki; Shlomo Ovadia, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?