透過您的圖書館登入
IP:18.191.28.129
  • 學位論文

基於角色的權限控管至網路資料庫之研究

A Study of Role-Based Access Control for Web Database

指導教授 : 留忠賢

摘要


網際網路帶給人們很多便利。但相對的,在網際網路上也是充斥著很多攻擊,也有不肖的使用者竊取其他人的私密資料。由於私密資料外流可能會造成某些人的困擾且不當的使用者有可能會造成資料隱碼的攻擊,所以如何保護網路資料庫的安全便大大的被需要且對於解決這些攻擊的方法還是不足夠的。 我們提供了一個方法來保護網路資料庫。這方法是基於角色的存取控管的觀念。對於資料庫裡的資料表,先利用角色來建立不同的檢視表。當程式開發者想要使用某資料表時,便可利用角色來選擇適當的檢視表,或者是利用自定的函數來取得資料,也可利用檢視表和自定函數結合來取得所需的資料。將使用一份XML文件來判斷某角色是否有權限使用某檢視表。如此的方法,可把原本在程式部份所作的存取控管移至資料庫部份。

並列摘要


SQL injection is a common type of database attacks in a web-based system. Parameterized view is an approach to SQL injection defense by transferring a user’s identification to databases to provide access control. But in the original form of parameterized view method, a view and an associated key were created for each user. In this thesis, we proposed to add role-based access control mechanism to the parameterized view. A view is created for each role, but not for each user, to reduce the number of views needed to be created. The identity of a user is mapped to a role, which is then used to create a view for that role. This view can thus be accessed by users of that role. An example system is also implemented for illustration.

參考文獻


[1] Extensible Markup Language (XML) 1.0, June 2007. http://www.w3.org/TR/REC-xml/.
[2] D. Ferraiolo and R. Kuhn. Role-Based Access Control. In Proceedings of the 15th NIST-NCSC National Computer Security Conference, October 1992, pp. 536-554.
[3] Ravi S. Sandhu, Edward Coyne, Hal Feinstein and Charles Youman. Role-Based Access Control Models. IEEE Computer, Volume 29, No. 2, February 1996, pp. 38-47.
[4] SQL Injection Attacks and Some Tips on How to Prevent Them, June 2007. http://www.codeproject.com/KB/database/SqlInjectionAttacks.aspx.
[5] SQL Injection Walkthrough, June 2007. http://www.securiteam.com/securityreviews/5DP0N1P76E.html.

被引用紀錄


蔡育倫(2015)。企業社會責任報導揭露與關係人交易之關聯性研究〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201500633
常美芳(2014)。審計委員會與關係人交易間之關聯性〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201400495

延伸閱讀