Tag

permission control

0 views collected around this technical thread.

Architect
Architect
Jan 13, 2025 · Backend Development

Designing a Flexible Permission Control System with Java Annotations and Spring AOP

This article explains how to build a flexible, scalable permission control system in Java using custom annotations and Spring AOP, covering basic concepts, system requirements analysis, database schema design, annotation definitions, aspect implementation, and business logic services for comprehensive access management.

AOPBackend DevelopmentJava
0 likes · 19 min read
Designing a Flexible Permission Control System with Java Annotations and Spring AOP
DataFunTalk
DataFunTalk
Jan 6, 2025 · Artificial Intelligence

Building and Applying NIO's Enterprise Knowledge Platform: Architecture, Challenges, and Future Directions

This article presents a comprehensive overview of NIO's company‑wide knowledge platform, detailing its background, layered architecture, retrieval‑augmented generation workflow, challenges such as accuracy, permission control and high concurrency, and future plans for AI‑assisted understanding, creation, multimodal capabilities, and expanded knowledge types.

AIRAGRetrieval-Augmented Generation
0 likes · 18 min read
Building and Applying NIO's Enterprise Knowledge Platform: Architecture, Challenges, and Future Directions
Youku Technology
Youku Technology
Oct 26, 2021 · Frontend Development

ABF Platform Configuration Center: Building a Configuration-Driven Middle-Office Development System

The ABF Platform Configuration Center serves as a factory‑style, configuration‑driven middle‑office development system that unifies application, page, permission, layout, and custom extensions, allowing nearly 100 % reuse of rendering functions and rapid, standardized creation of internal business applications.

ABF PlatformConfiguration CenterMiddle-Office System
0 likes · 9 min read
ABF Platform Configuration Center: Building a Configuration-Driven Middle-Office Development System
Top Architect
Top Architect
Aug 20, 2020 · Information Security

Understanding Permission Control in Frontend‑Backend Separation Architecture

The article explains how permission control in a front‑back separation architecture defines resources and permissions, outlines the distinct responsibilities of frontend and backend in enforcing access, and provides practical implementation examples with component tags and Java interceptor code.

Access ControlComponent DesignFrontend Development
0 likes · 6 min read
Understanding Permission Control in Frontend‑Backend Separation Architecture
Architecture Digest
Architecture Digest
Mar 19, 2020 · Frontend Development

Design and Implementation of Permission Control in Frontend‑Backend Separation Architecture

This article explains how permission control is re‑designed for front‑end/back‑end separated applications, defining resources and permissions, outlining the distinct responsibilities of front‑end routing and component rendering versus back‑end API validation, and providing practical implementation examples in React and Java.

Access ControlBackend DevelopmentComponent Design
0 likes · 7 min read
Design and Implementation of Permission Control in Frontend‑Backend Separation Architecture
Efficient Ops
Efficient Ops
Feb 25, 2020 · Information Security

What Went Wrong? Lessons from the 2020 Weimeng DevOps Disaster

The 2020 Weimeng incident, caused by a malicious VPN‑based intrusion that deleted production databases, exposed massive financial loss, damaged corporate reputation, and highlighted critical gaps in permission control, backup strategies, legal compliance, and security awareness for modern operations teams.

DevOpsbackup strategylegal compliance
0 likes · 14 min read
What Went Wrong? Lessons from the 2020 Weimeng DevOps Disaster
Java Captain
Java Captain
Aug 17, 2019 · Frontend Development

Designing Permission Control in a Front‑End/Back‑End Separated Architecture

This article explains how permission control is re‑thought for front‑end/back‑end separated systems, defining resources and permissions, outlining the distinct responsibilities of the front‑end and back‑end, and providing concrete implementation examples with component‑level checks and server‑side interceptors.

AuthorizationJavabackend
0 likes · 6 min read
Designing Permission Control in a Front‑End/Back‑End Separated Architecture
Efficient Ops
Efficient Ops
Nov 17, 2016 · Operations

How Qunar Built an Automated Network Device Operations Platform to Boost Efficiency

This article explains how Qunar tackled growing network device management workload, low‑efficiency manual processes, and operational risk by designing an integrated platform that automates common tasks, enforces permission‑based controls, records audits, and provides real‑time monitoring and scalable data collection.

AutomationMonitoringnetwork operations
0 likes · 8 min read
How Qunar Built an Automated Network Device Operations Platform to Boost Efficiency
Qunar Tech Salon
Qunar Tech Salon
Oct 11, 2016 · Operations

Design and Implementation of Qunar Network Device Operations Platform

Facing growing network device counts and limited netops staff, Qunar built a network device operations platform that integrates command automation, permission-controlled tasks, monitoring, and dynamic scaling using Docker, Marathon, and Celery, thereby improving efficiency, reducing risk, and enabling comprehensive auditability.

AutomationDevOpsInfrastructure
0 likes · 8 min read
Design and Implementation of Qunar Network Device Operations Platform