Role - based Access Control in Educational Administration System

Liu Dongdong, Xu Shiliang, Zhang Yan, Tan Fuxiao, Niu Lei, Zhao Jia, Bing Xu, Yinong Chen
2017 MATEC Web of Conferences  
In the 21st century, the network of teaching management not only improves its quality and efficiency but also brings convenience to teachers and students. However, as a network application system, it also faces a variety of security issues. In order to improve the system security , the widely-used RBAC control method is introduced in this paper. Based on the refinement of system privilege and user role, this paper puts forward the security management model of "user classification, role
more » ... tion , Unified management ", which is more suited to the structure of multi-level applications by controlling the data range accessible to users, and ultimately achieves the purpose of strengthening the security of the system. role contains all the privileges (as shown in Fig1). In the RBAC model, role can exist inheritance relationship, that is, upper level role can be part or all of the inheritance of the role of the next level of authority, this role inheritance relationship to form the role of the hierarchy.
doi:10.1051/matecconf/201713900120 fatcat:k5apwminr5exjcjbherpiogeca