{"title":"IETM访问控制技术研究","authors":"Jiaju Wu, Xinglin Zhu, Zhengji Liu, Rong Yu","doi":"10.1109/ICRMS.2016.8050036","DOIUrl":null,"url":null,"abstract":"With the intensive and large scale application of interactive electrical technical manual (IETM) in equipment integrated support, security becomes one of the most important problems. As an important part of security domain, access control technique is used to limit users' capability and scope to access data and ensure the information resources not to be accessed illegally. This paper focuses on access control technology in IETM. First, it introduces traditional access models and methods, and puts forward model, role, resource and mission based access control (MRRFAC) model according to IETM access control requirement. Then, it thoroughly analyses IETM access control strategy of function, manual, mission, data resource authority. Finally, J2EE and Web Service are used to develop access control components, which are integrated by IETM business systems or subsystems to realize fine grain IETM access control.","PeriodicalId":347031,"journal":{"name":"2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on IETM access control technology\",\"authors\":\"Jiaju Wu, Xinglin Zhu, Zhengji Liu, Rong Yu\",\"doi\":\"10.1109/ICRMS.2016.8050036\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the intensive and large scale application of interactive electrical technical manual (IETM) in equipment integrated support, security becomes one of the most important problems. As an important part of security domain, access control technique is used to limit users' capability and scope to access data and ensure the information resources not to be accessed illegally. This paper focuses on access control technology in IETM. First, it introduces traditional access models and methods, and puts forward model, role, resource and mission based access control (MRRFAC) model according to IETM access control requirement. Then, it thoroughly analyses IETM access control strategy of function, manual, mission, data resource authority. Finally, J2EE and Web Service are used to develop access control components, which are integrated by IETM business systems or subsystems to realize fine grain IETM access control.\",\"PeriodicalId\":347031,\"journal\":{\"name\":\"2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRMS.2016.8050036\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference on Reliability, Maintainability and Safety (ICRMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRMS.2016.8050036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the intensive and large scale application of interactive electrical technical manual (IETM) in equipment integrated support, security becomes one of the most important problems. As an important part of security domain, access control technique is used to limit users' capability and scope to access data and ensure the information resources not to be accessed illegally. This paper focuses on access control technology in IETM. First, it introduces traditional access models and methods, and puts forward model, role, resource and mission based access control (MRRFAC) model according to IETM access control requirement. Then, it thoroughly analyses IETM access control strategy of function, manual, mission, data resource authority. Finally, J2EE and Web Service are used to develop access control components, which are integrated by IETM business systems or subsystems to realize fine grain IETM access control.