VREMENSKO I LOKACIJSKO PROŠIRENJE KONTROLE PRISTUPA BAZIRANE NA ULOGAMA U SPRING SECURITY OKRUŽENJU
Ključne reči:
Java, Spring, kontrola pristupa, autorizacija
Apstrakt
U radu je prikazana implementacija vremenskog i lokacijskog proširenja kontrole pristupa bazirane na ulogama u Spring Security okruženju. Implementacija je podeljena na dve celine, gde je prva celina generički modul za kontrolu pristupa, a druga, veb aplikacija koja taj modul koristi za kontrolu pristupa.
Reference
[1] Kumar, Mahendra / Newman, Richard E. STRBAC - AN APPROACH TOWARDS SPATIO-TEMPORAL ROLE-BASED. Gainesville, FL 32608 : CISE Department Gainesville, FL 32608, 2006.
[2] LoT-RBAC: A Location and Time-Based RBAC Model. Chandran, Suroop Mohan / Joshi, J. B. D. Department of Information Sciences and Telecommunications, University of Pittsburgh : s.n., 2005.
[3] Access control. Wikipedia. [Na mreži] https://en.wikipedia.org/wiki/Access_control.
[4] Role based access control. [Na mreži] https://en.wikipedia.org/wiki/Role-based_access_control.
[5] Attribute based access control. [Na mreži] https://en.wikipedia.org/wiki/Attribute-based_access_control.
[6] Discretionary access control. [Na mreži] https://en.wikipedia.org/wiki/Discretionary_access_control.
[7] Mandatory access control. [Na mreži] https://en.wikipedia.org/wiki/Mandatory_access_control.
[8] Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. Role-based access control models. [Na mreži] 1996. https://ieeexplore.ieee.org/abstract/document/485845.
[9] Authorization. Spring. [Na mreži] https://docs.spring.io/spring-security/site/docs/current/reference/html/authorization.html.
[10] Java. [Na mreži] https://docs.oracle.com/javase/8/docs/api/.
[11] Spring. [Na mreži] https://spring.io/.
[2] LoT-RBAC: A Location and Time-Based RBAC Model. Chandran, Suroop Mohan / Joshi, J. B. D. Department of Information Sciences and Telecommunications, University of Pittsburgh : s.n., 2005.
[3] Access control. Wikipedia. [Na mreži] https://en.wikipedia.org/wiki/Access_control.
[4] Role based access control. [Na mreži] https://en.wikipedia.org/wiki/Role-based_access_control.
[5] Attribute based access control. [Na mreži] https://en.wikipedia.org/wiki/Attribute-based_access_control.
[6] Discretionary access control. [Na mreži] https://en.wikipedia.org/wiki/Discretionary_access_control.
[7] Mandatory access control. [Na mreži] https://en.wikipedia.org/wiki/Mandatory_access_control.
[8] Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. Role-based access control models. [Na mreži] 1996. https://ieeexplore.ieee.org/abstract/document/485845.
[9] Authorization. Spring. [Na mreži] https://docs.spring.io/spring-security/site/docs/current/reference/html/authorization.html.
[10] Java. [Na mreži] https://docs.oracle.com/javase/8/docs/api/.
[11] Spring. [Na mreži] https://spring.io/.
Objavljeno
2019-08-21
Sekcija
Elektrotehničko i računarsko inženjerstvo