【正文】
模式的優(yōu)點(diǎn) B/S結(jié)構(gòu)就是只安裝維護(hù)服務(wù)器,將系統(tǒng)布置到服務(wù)器中,客戶端采用瀏覽器來(lái)運(yùn)行軟件,即瀏覽器 /服務(wù)器結(jié)構(gòu)。 通過(guò)建立權(quán)限管理系統(tǒng),可以保證每個(gè)員工只能根據(jù)自己的本職工作對(duì)系統(tǒng)數(shù)據(jù)進(jìn)行限制性操作,防止信息泄露篡改問(wèn)題的發(fā)生,為使系統(tǒng)更好的方便日常工作提供有效的安全保障。 JSP 可用等式表示為:HTML+Java=JSP。 Java 程序段可以對(duì)數(shù)據(jù)庫(kù)數(shù)據(jù)進(jìn)行操作,也可以返回或者前進(jìn)到另外一個(gè)界面。 項(xiàng)目背景 在 20世紀(jì) 90年代發(fā)展并日臻完善的 基于角色的訪問(wèn)控制( RBAC, RoleBased Access Control) 是 一種管理和增強(qiáng)系統(tǒng)安全性的技術(shù)。s realization is given, users first must log in to access the privilege management system, for each user group one or more users are selected and their roles and authority s are identified, and then they can view the client list and details about each client, so as to achieve the goal of protection system information. The authority management system is based on fashionable JSP language and MySQL database technology to authenticate user identity authorization information. Authority administrative system that adopts this method has stronger monness and practicability, which can meet demand of authority management in general application system. As the subsidiary system of information system, the system is good enough to achieve the integration and separation between the user and the function. Practices show that an authority management system based on RBAC is the most convenient and efficient safety management control. Key words: Network information security; RoleBased Access Control; Authority management system; Role 濟(jì)南大學(xué)畢業(yè)設(shè)計(jì) 目錄 摘 要 ............................................................... I ABSTRACT .............................................................. II 1 前言 ............................................................. 1 項(xiàng)目背景 .................................................... 1 目的及意義 .................................................. 1 B/S 開(kāi)發(fā)模式的優(yōu)點(diǎn) .......................................... 2 2 需求分析 ......................................................... 3 系統(tǒng)概述 .................................................... 3 系統(tǒng)功能 需求分析 ............................................ 3 用戶管理 .............................................. 3 角色管理 .............................................. 4 功能管理 .............................................. 4 UML 建模 .................................................... 4 管理員用戶的用例關(guān)系圖 ................................ 4 一般用戶的用例關(guān)系圖 .................................. 5 系統(tǒng)性能分析 ................................................ 6 安全性需求分析 ........................................ 6 穩(wěn)定性需求分析 ........................................ 7 3 概要設(shè)計(jì) ......................................................... 8 總體設(shè)計(jì) .................................................... 8 模塊劃分 .............................................. 8 模塊設(shè)計(jì) .............................................. 9 模塊設(shè)計(jì) ................................................... 11 權(quán)限管理模塊 .......................................... 11 用戶 密碼修改模塊 ..................................... 13 用戶賬戶管理模塊 ..................................... 14 數(shù)據(jù)結(jié)構(gòu)設(shè)計(jì) ............................................... 16 用戶信息表 ........................................... 16 角色信息表 ........................................... 17 功能菜單表 ........................................... 17 角色菜單表 ........................................... 17 4 設(shè)計(jì)與實(shí)現(xiàn) ....................................................... 18 軟件架構(gòu) ................................................... 18 濟(jì)南大學(xué)畢業(yè)設(shè)計(jì) 系統(tǒng)架構(gòu) ................................................... 18 訪問(wèn)控制設(shè)計(jì) ............................................... 19 5 系統(tǒng)測(cè)試 ......................................................... 20 測(cè)試目的 ................................................... 20 測(cè)試內(nèi)容 ................................................... 20 功能測(cè)試 ............................................ 20 性能測(cè)試 ............................................. 20 測(cè)試用例 ................................................... 20 測(cè)試結(jié)果分析 ............................................... 24 6 總結(jié)與展望 ....................................................... 25 結(jié) 論 .......................................................... 26 參 考 文 獻(xiàn) ....................................................... 27 致 謝 .......................................................... 29 濟(jì)南大學(xué)畢業(yè)設(shè)計(jì) 1 1 前言 隨著計(jì)算機(jī)和網(wǎng)絡(luò)信息技術(shù)的高速發(fā)展,網(wǎng)絡(luò)信息的安全成為越來(lái)越大的問(wèn)題,而訪問(wèn)控制技術(shù)是實(shí)現(xiàn)系統(tǒng)信息安全的重要手段。這套系統(tǒng)具有權(quán)限分配簡(jiǎn)單、擴(kuò)展性好的優(yōu)點(diǎn),并且支持崗位、權(quán)限多變的各種需求。濟(jì)南大學(xué)畢業(yè)設(shè)計(jì) I 摘 要 隨著經(jīng)濟(jì)社會(huì)的發(fā)展和信息科學(xué)技術(shù)的不斷進(jìn)步,信息的處理量越來(lái)越大,也越來(lái)越繁雜,于是計(jì)算機(jī)技術(shù)被廣泛的應(yīng)用到社會(huì)的各個(gè)領(lǐng)域之中。