Dissertation
Dissertation > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer software > Program design,software engineering > Software Engineering > Software Development

The Application of Permission Management in Computer Library Management System

Author SunYao
Tutor HuangWeiZu;ZhangXia
School Northeastern University
Course Software Engineering
Keywords Computer Library Management System Permission Management Role-Based Access Control integrate
CLC TP311.52
Type Master's thesis
Year 2009
Downloads 38
Quotes 0
Download Dissertation

Permission management system is the most component of some application system, and well system permission control guarantees the success of system implementation. This article’s research is expanding of the computer library management system combining the permission management and control.This system studied the application unit of the computer library management system, analyzed and summarized the specific system needs of user management and permission management.This system adopted the access control model which bases on the role, designed the class and database of the permission management, and implemented the application of permission management system. With this, permission administrator can configure permission and user management. This system adopted the B/S three level architecture model, which enhance the system’s maintainability and expansion.In order to achieve the integration of the permission management system and the computer library management system, This system develop the interface of the permission management system. Computer library management system can easily call these interfaces, and can control the access and manipulate authority effectively.This system implemented the dynamic permission management and user management based on the actual needs of computer library management system. The system brings about some assistant functions correlated with user and security. Such as message communication between user and module, log management and so on.

Related Dissertations
More Dissertations