|
This article is cited in 1 scientific paper (total in 1 paper)
COMPUTER SOFTWARE AND COMPUTING EQUIPMENT
Method of assigning access rights to applications in corporate mobile network
A. G. Kravetsab, N. A. Salnikovac a Volgograd State Technical University,
Volgograd, Russia
b Dubna State University, Dubna, Russia
c Volgograd Institute of Management – branch of the Russian Academy Presidential Academy of National Economy and Public Administration
Abstract:
The article focuses on studying and implementing a method of assigning access rights to the applications in a corporate mobile network with different requirements for security, which will allow considering the specific activities of multiple users. The existing solutions for assigning access rights to applications and services of the intranet are analyzed, the need to create a method that ensures information security when implementing access in corporate networks with different requirements for the level of security is substantiated. Due to the results of analysis of trends and development prospects of modern corporate mobile networks there has been found a contradiction between the requirements for information security of universal mobile devices with access to secure services and technical capabilities of information security systems that ensure access security in the corporate networks with different security requirements. To solve the problem, a multi-user system has been implemented that ensures operation of any computer equipment and mobile devices of an organization whose DBMS has a client-server architecture. The functional requirements for the developed method include the ability to perform user authorization, providing the administrator with the ability to manage user access rights to various applications, managing application storage, recording user operations, and keeping records. In the course of the software implementation of the method of assigning access rights, the design of the database is described in stages, a model of information flows is built, a physical diagram of the interaction of individual procedures is considered, on the basis of which the database is created, a user interface with forms that display information stored in the database is developed.
Keywords:
access rights, user, data storage, security, information protection, differentiation of powers, application, corporate network, Web server.
Received: 02.12.2022 Accepted: 19.01.2023
Citation:
A. G. Kravets, N. A. Salnikova, “Method of assigning access rights to applications in corporate mobile network”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2023, no. 1, 71–82
Linking options:
https://www.mathnet.ru/eng/vagtu743 https://www.mathnet.ru/eng/vagtu/y2023/i1/p71
|
Statistics & downloads: |
Abstract page: | 54 | Full-text PDF : | 39 | References: | 17 |
|