wsscvzxvzx vx sscsadfzzcAA
gvac vqa123453xcvfqxdvwzcvsdvx
毕业设计
Java 权限管理系统
班 级: 学号:
姓 名:
学 院:
专 业:
指导教师:
软件工程
软件学院
wsscvzxvzx vx sscsadfzzcAA
gvac vqa123453xcvfqxdvwzcvsdvx
Java 权限管理系统
摘要
随着信息技术的快速发展,信息安全已成为人们高度关注的问题,特别是在
企事业的信息系统管理中,针对资源共享而引出的访问控制技术也得到了广泛的
研究。本课题在对信息系统的权限管理相关理论和方法进行研究的基础上,通过
比较几种常见的访问控制方式的优缺点,目前信息系统的权限管理的需求进行分
析。本文结合公司的基础技术平台的典型应用需求为背景,初步探索了访问控制
的理论、方法以及基本流程,并在此基础上设计了权限管理系统的架构模型,实
现了简单的原型系统,给出了系统的应用实例。论文完成的主要工作如下:
(1)在访问控制技术理论研究的基础上,本文对权限管理系统的功能进行了
详细的需求分析,设计了权限管理的系统架构,对系统的各个功能模块进行了详
细设计,分为角色管理,部门管理,用户管理。
(2)在 Windows 环境下采用 Java 编程语言实现了权限管理架构的原型系
统,并初步对其原理的可行性进行测试,给出了应用实例。该系统可以作为其他
信息系统的一个子系统,能辅助管理人员完成系统的安全访问控制。通过对原型
系统的实验分析,初步验证了本文所提出的方法以及系统设计方案的有效性和正
确性。
关键词:权限管理,访问控制,角色,部门,用户
wsscvzxvzx vx sscsadfzzcAA
gvac vqa123453xcvfqxdvwzcvsdvx
Java permission management system
Abstract
With the rapid development of information technology, information security
has become the people's attention, especially in the information management system of
enterprise, access control technique for resource sharing and the concept has been
widely studied. The subject of study in the privilege management related theory and
method of information system, the advantages and disadvantages by comparing several
common access control mode, analysis and power demand management of the
information system, the role-based access control technology was modified to make it
more flexible in the role permissions management based on, By comparing several
common access control mode, analysis and power demand management of the
information system, the role-based access control technology was modified to make it
more flexible in the role of authority management. Combining with the typical
application requirements of company’s technology platform for the background, this
thesis studied the theories, methods, and the basic process of access control, and on
this basis designed the role of authority management system architecture model,
implemented a simple prototype system, and some examples of the system are given.
The main contents of this thesis are as follows:
(1) On the basis of theoretical study of access control technology, this thesis
makesa detailed analysis for privilege management features of the system, design the
systemarchitecture of privilege management based on role, and has carried on the
detaileddesign of each functional module of the system.
(2) The prototype system of authority management architecture based on the role is
implemented using Java programming language under Windows environment, its
principle feasibility was initially tested, and the running examples were also gave. This
system can be as a subsystem of other information systems, can assist managers to
complete the security access control of system.system.
Key words: right management,access control,role,department,user
wsscvzxvzx vx sscsadfzzcAA
gvac vqa123453xcvfqxdvwzcvsdvx
目 录
1 绪论 ............................................................... 1
1.1 课题的背景和意义 .................................................. 1
1.2 国内外发展状况 ................................................... 2
1.3 研究内容及目标 ................................................... 2
1.4 本文结构 ......................................................... 2
2 开发方法及关键技术简介 ............................................. 3
2.1 开发工具与运行环境 ............................................... 3
2.2 主要问题及解决手段 ............................................... 4
2.3 关键技术简介 ..................................................... 4
2.3.1 JSP 技术 ........................................................ 4
2.3.2 Oracle 数据库技术 ............................................... 5
2.3.3 B/S 结构 ........................................................ 5
2.3.4 Tomcat 技术 ..................................................... 5
2.3.5 SSH 框架简介 ................................................... 6
3 总体设计 ........................................................... 8
3.1 权限系统概述 ..................................................... 8
3.2 权限系统实现的目标 ............................................... 8
3.3 权限管理系统网络体系结构 ......................................... 9
3.4 权限管理系统功能设计 ............................................ 10
3.4.1 系统功能结构图 ................................................ 10
3.4.2 系统功能模块设计 .............................................. 10
3.5 系统登录图 ...................................................... 11
3.6 时序图 .......................................................... 11
3.7 UML用例图 ....................................................... 12
3.8 系统数据库设计 ................................................... 14
4 权限管理系统功能实现 .............................................. 16
wsscvzxvzx vx sscsadfzzcAA
gvac vqa123453xcvfqxdvwzcvsdvx
4.1 安全认证功能 .................................................... 16
4.1.1 系统注册功能的实现 ............................................ 16
4.1.2 系统登录功能的实现 ............................................ 16
4.2 功能权限管理功能 ................................................ 17
4.3 权限树 .......................................................... 18
5 系统开发环境配置 .................................................. 20
6 软件测试 .......................................................... 25
6.1 软件测试指导思想及目的 ........................................... 25
6.2 软件测试过程 ..................................................... 25
6.3 测试结果 ......................................................... 26
7 总结 .............................................................. 27
参 考 文 献 ......................................................... 28
致 谢 .............................................................. 30