Method of assigning access rights to applications in corporate mobile network

Author:

Kravec Alla Grigor'evna1,Sal’nikova Natal’ia Anatol'evna2

Affiliation:

1. Volgograd State Technical University; Dubna State University

2. Volgograd Institute of Management – branch of the Russian Academy Presidential Academy of National Economy and Public Administration

Abstract

The article focuses on studying and implementing a method of assigning access rights to the applications in a corporate mobile network with different requirements for security, which will allow considering the specific activities of multiple users. The existing solutions for assigning access rights to applications and services of the intranet are analyzed, the need to create a method that ensures information security when implementing access in corporate networks with different requirements for the level of security is substantiated. Due to the results of analysis of trends and development prospects of modern corporate mobile networks there has been found a contradiction between the requirements for information security of universal mobile devices with access to secure services and technical capabilities of information security systems that ensure access security in the corporate networks with different security requirements. To solve the problem, a multi-user system has been implemented that ensures operation of any computer equipment and mobile devices of an organization whose DBMS has a client-server architecture. The functional requirements for the developed method include the ability to perform user authorization, providing the administrator with the ability to manage user access rights to various applications, managing application storage, recording user operations, and keeping records. In the course of the software implementation of the method of assigning access rights, the design of the database is described in stages, a model of information flows is built, a physical diagram of the interaction of individual procedures is considered, on the basis of which the database is created, a user interface with forms that display information stored in the database is developed.

Publisher

Astrakhan State Technical University

Subject

General Medicine

Reference25 articles.

1. Гнеушев В. А., Кравец А. Г., Козунова С. С., Бабенко А. А. Моделирование сетевых атак злоумышленников в корпоративной информационной системе // Промышленные АСУ и контроллеры. 2017. № 6. С. 51–60., Gneushev V. A., Kravec A. G., Kozunova S. S., Babenko A. A. Modelirovanie setevyh atak zloumyshlennikov v korporativnoy informacionnoy sisteme // Promyshlennye ASU i kontrollery. 2017. № 6. S. 51–60.

2. Буй Нгок Зыонг. Управление и анализ качества мобильного доступа к корпоративным информационным ресурсам: дис. … канд. техн. наук. Волгоград, 2017. 136 с., Buy Ngok Zyong. Upravlenie i analiz kachestva mobil'nogo dostupa k korporativnym informacionnym resursam: dis. … kand. tehn. nauk. Volgograd, 2017. 136 s.

3. Kravets A. G., Salnikova N. A., Mikhnev I. P., Orudjev N. Y., Poplavskaya O. V. Web Portal for Project Management in Electronics Design Software Development // 2019 International Seminar on Electron Devices Design and Production, SED 2019 – Proceedings (Prague, 23–24 апреля 2019 г.). Institute of Electrical and Electronics Engineers, 2019. P. 8798472., Kravets A. G., Salnikova N. A., Mikhnev I. P., Orudjev N. Y., Poplavskaya O. V. Web Portal for Project Management in Electronics Design Software Development // 2019 International Seminar on Electron Devices Design and Production, SED 2019 – Proceedings (Prague, 23–24 aprelya 2019 g.). Institute of Electrical and Electronics Engineers, 2019. P. 8798472.

4. Болотин П. Управление правами доступа в корпоративных Web-системах. URL: http://www.iksmedia.ru/articles/23910-Upravlenie-pravami-dostupa-v-korpor.html (дата обращения: 14.01.2022)., Bolotin P. Upravlenie pravami dostupa v korporativnyh Web-sistemah. URL: http://www.iksmedia.ru/articles/23910-Upravlenie-pravami-dostupa-v-korpor.html (data obrascheniya: 14.01.2022).

5. Kravets A., Salnikova N., Dmitrenko K., Lempert M. Industrial Cyber-Physical Systems: Risks Assessment and Attacks Modeling // Studies in Systems, Decision and Control. 2020. V. 260. С. 197–210., Kravets A., Salnikova N., Dmitrenko K., Lempert M. Industrial Cyber-Physical Systems: Risks Assessment and Attacks Modeling // Studies in Systems, Decision and Control. 2020. V. 260. S. 197–210.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Big Data Security Evaluation by Bidirectional Analysis of Access Control Policy;2024 International Russian Smart Industry Conference (SmartIndustryCon);2024-03-25

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3