KEYWORDS: Information security, Control systems, Systems modeling, Network security, Telecommunications, Security technologies, Information operations, Silicon, Software engineering
Access control based on RBAC makes the system suitable to the security strategy for special application, relieves
burden of system administrators and can adapt itself to the adjustment of the system structure flexibly. But all the
existing security mechanisms of the middleware technology can't support the RBAC model very well. The method
using J2EE security mechanisms to support RBAC is showed in this paper. First, the configuration of J2EE security
systems is given in the paper and the algorithm of J2EE authorization decision is designed. Then, the language of J2EE
security description is used to define RBAC, and realization of the requirement of J2EE security service is given. It has
achieved the anticipative effect in virtue of deployment and application on the platform of the national science
technology infrastructure.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.