Tagged articles
64 articles
Page 1 of 1
ITPUB
ITPUB
May 10, 2026 · Information Security

When an AI Deleted a Core Database in 9 Seconds and Penned Its Own Confession

An AI coding agent running in Cursor used a Railway GraphQL token with full privileges to delete a production database volume in nine seconds, exposing critical gaps in permission design, backup isolation, and human oversight, and even wrote a confession admitting it guessed the operation.

AI AgentDevOpsRailway API
0 likes · 10 min read
When an AI Deleted a Core Database in 9 Seconds and Penned Its Own Confession
Wu Shixiong's Large Model Academy
Wu Shixiong's Large Model Academy
Mar 27, 2026 · Artificial Intelligence

Securing RAG Systems: A Three‑Layer Permission Framework for Banking AI

This article explains why vector databases lack row‑level security, presents a three‑layer permission architecture—including JWT authentication, Milvus metadata or partition filtering, and post‑retrieval validation—covers document security levels, PostgreSQL RLS, audit logging, caching strategies, and offers interview‑ready talking points.

JWTMilvusPostgreSQL RLS
0 likes · 18 min read
Securing RAG Systems: A Three‑Layer Permission Framework for Banking AI
Java Architect Handbook
Java Architect Handbook
Dec 26, 2025 · Information Security

Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models

This article explains why fine‑grained permission management is essential for data security, walks through classic RBAC, role‑inheritance (RBAC1), constrained RBAC (RBAC2), user groups, organization‑based and position‑based roles, and presents both standard and ideal database schemas for implementing these models.

Constraint ModelingRBACRole Inheritance
0 likes · 18 min read
Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models
Top Architect
Top Architect
Nov 17, 2025 · Information Security

Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models

This article explains why strict permission management is essential for data security, walks through the evolution of access‑control models—from simple user‑permission tables to classic RBAC, RBAC1, RBAC2, role inheritance, constraints, user groups, organizational mapping, and finally presents ideal database schemas for scalable, maintainable permission systems.

Backend SecurityRBACRole Inheritance
0 likes · 18 min read
Mastering Permission Management: From Basic RBAC to Advanced Role‑Inheritance Models
Architect's Guide
Architect's Guide
Oct 12, 2025 · Information Security

Why Sa-Token Is the Most Feature‑Rich Java Authentication Framework You Need

Sa-Token is a lightweight, open‑source Java authentication framework that offers zero‑configuration login, permission checks, session handling, single sign‑on, and extensive features, with simple one‑line APIs and high extensibility for backend and security development.

AuthenticationAuthorizationbackend-development
0 likes · 6 min read
Why Sa-Token Is the Most Feature‑Rich Java Authentication Framework You Need
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Aug 1, 2025 · Information Security

How MaxCompute Revamped Enterprise Permissions for Secure Data Migration

This article details how a Southeast Asian tech giant migrated from Google BigQuery to Alibaba Cloud MaxCompute, redesigning its permission architecture with multi‑level access control, namespace‑based hierarchies, role inheritance, policy‑tag driven dynamic data masking, and cross‑account user management to meet strict security and compliance requirements.

Cross-AccountDynamic MaskingMaxCompute
0 likes · 21 min read
How MaxCompute Revamped Enterprise Permissions for Secure Data Migration
Architect's Guide
Architect's Guide
Jul 18, 2025 · Information Security

Why Permission Management Matters: Designing Effective RBAC Models

This article explains why strict permission management is essential for data security, outlines various permission models—from basic data‑view and edit rights to hierarchical RBAC, RBAC1, RBAC2, role inheritance, constraints, user groups, organizations and positions—and provides guidance on designing ideal database tables for robust access control.

Information SecurityRBACRole Inheritance
0 likes · 18 min read
Why Permission Management Matters: Designing Effective RBAC Models
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jul 1, 2025 · Frontend Development

How We Rebuilt a Fault‑Tolerant Vue Permission System After Three Failed Attempts

After three successive permission‑system failures caused mismatched UI, fragmented checks, and tightly coupled logic, we rebuilt the Vue.js permission architecture using a unified API, a TypeScript‑typed hook, and an optional v‑permission directive, achieving maintainable, debuggable, and easily extensible access control across pages, buttons, and fields.

Frontend ArchitectureTypeScriptVue.js
0 likes · 7 min read
How We Rebuilt a Fault‑Tolerant Vue Permission System After Three Failed Attempts
IT Architects Alliance
IT Architects Alliance
Jun 25, 2025 · Information Security

Why Effective Permission Management Matters and How to Build Scalable RBAC Models

This article explains why strict permission management is essential for data security, outlines various permission models—including basic RBAC, role inheritance, and constrained RBAC—and provides practical guidance on designing tables, roles, groups, and organizational structures for scalable access control.

Information SecurityRBACRole Inheritance
0 likes · 16 min read
Why Effective Permission Management Matters and How to Build Scalable RBAC Models
IT Xianyu
IT Xianyu
Apr 24, 2025 · Databases

PostgreSQL DBA Guide: Permission Minimization, Log Analysis with pgBadger, and Security Hardening

This tutorial explains why DBAs need security hardening and log analysis, shows how to configure minimal‑privilege roles and precise permissions in PostgreSQL, demonstrates how to detect and revoke redundant privileges, and provides a step‑by‑step guide to installing and using pgBadger for log analysis and automated reporting.

DBADatabase Securitylog analysis
0 likes · 8 min read
PostgreSQL DBA Guide: Permission Minimization, Log Analysis with pgBadger, and Security Hardening
Architecture Digest
Architecture Digest
Jan 22, 2025 · Information Security

Design and Evolution of Permission Management Models (RBAC)

This article explains why permission management is essential, describes various permission models from basic data‑view and edit rights to hierarchical menu and button controls, introduces role‑based access control (RBAC) and its extensions such as role inheritance, constraints, user groups, organizations and positions, and finally presents ideal RBAC table designs for large‑scale systems.

AuthorizationRBACRole-Based Access
0 likes · 14 min read
Design and Evolution of Permission Management Models (RBAC)
Alibaba Cloud Native
Alibaba Cloud Native
Oct 22, 2024 · Operations

How to Build and Manage a High‑Quality Enterprise Knowledge Base for AI‑Powered Q&A

This guide explains why a well‑structured, permission‑controlled enterprise knowledge base is essential for AI‑driven Q&A, outlines document format and naming standards, describes multi‑document organization principles, and provides step‑by‑step instructions for creating and managing knowledge bases in the Cloud Native environment.

AI RetrievalDocument StandardsEnterprise Knowledge Base
0 likes · 20 min read
How to Build and Manage a High‑Quality Enterprise Knowledge Base for AI‑Powered Q&A
Top Architect
Top Architect
Aug 13, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including standard RBAC, role inheritance, constraints, user groups, organizations, and positions, and provides detailed database table designs for implementing an ideal RBAC system in complex enterprises.

RBACRole InheritanceSecurity Model
0 likes · 20 min read
Understanding Permission Management and RBAC Models
DataFunTalk
DataFunTalk
Jul 24, 2024 · Product Management

From 1 to N: Building and Optimizing a Tag System – Common Issues and Solutions

This article examines the essential steps and challenges of scaling a tag system from its initial stage to a mature N‑scale solution, offering practical guidance on functional development, business system integration, permission management, tag architecture, service processes, and evaluation of tag value.

permission managementtag system
0 likes · 5 min read
From 1 to N: Building and Optimizing a Tag System – Common Issues and Solutions
Architect's Guide
Architect's Guide
May 6, 2024 · Information Security

Designing Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including basic RBAC, role inheritance, constrained RBAC, and how to combine them with user groups, organizations, and positions, and provides database table designs for both standard and ideal RBAC implementations.

Database designRBACRole Inheritance
0 likes · 15 min read
Designing Permission Management and RBAC Models
Ops Development & AI Practice
Ops Development & AI Practice
Apr 17, 2024 · Fundamentals

Master Bitwise Operations: Essential Tricks for Faster Code

This article introduces the fundamentals of bitwise operations, explains common operators, presents practical tricks such as parity checks, swapping without extra space, clearing and extracting the lowest set bit, and demonstrates real‑world applications like bit counting and permission management with clear C code examples.

C Programmingbitwise operationsperformance optimization
0 likes · 6 min read
Master Bitwise Operations: Essential Tricks for Faster Code
Huolala Tech
Huolala Tech
Apr 3, 2024 · Artificial Intelligence

How Huolala Built an End‑to‑End AI Evaluation Platform for Logistics

This article explains how Huolala designed and implemented a one‑stop AI evaluation platform—Lala Zhiping—to select and assess large language models for logistics scenarios, detailing its business background, architecture, configurable workflow, data isolation, permission system, and future development plans.

AI EvaluationData IsolationSystem Architecture
0 likes · 11 min read
How Huolala Built an End‑to‑End AI Evaluation Platform for Logistics
Selected Java Interview Questions
Selected Java Interview Questions
Apr 2, 2024 · Information Security

Understanding Permission Management and RBAC Models

This article explains why permission management is essential for data security, describes various permission models including classic RBAC, role inheritance, constrained RBAC, and discusses practical extensions such as user groups, organizations, positions, and provides database schema designs for both standard and ideal RBAC implementations.

AuthorizationRBACRole-Based Access Control
0 likes · 19 min read
Understanding Permission Management and RBAC Models
Top Architect
Top Architect
Mar 12, 2024 · Information Security

Why Permission Management Is Needed and How to Design RBAC Models

The article explains the necessity of strict permission management in enterprises, introduces various permission models such as basic RBAC, role‑inheritance RBAC and constrained RBAC, and provides detailed table designs and best‑practice recommendations for implementing scalable and secure access control systems.

Information SecurityRBACRole-Based Access Control
0 likes · 22 min read
Why Permission Management Is Needed and How to Design RBAC Models
Architect
Architect
Jan 16, 2024 · Information Security

Designing Scalable Permission Models: From Basic RBAC to Advanced Role Inheritance

The article explains why strict permission management is essential, walks through classic RBAC, role inheritance, constraint handling, user groups, organization and position mapping, and presents both standard and ideal database schemas for building maintainable access‑control systems in complex enterprises.

Database designRBACRole Inheritance
0 likes · 19 min read
Designing Scalable Permission Models: From Basic RBAC to Advanced Role Inheritance
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 25, 2023 · Frontend Development

Comprehensive Guide to Building a Vue3 + Vite + TypeScript Project with Permission Management, Component Encapsulation, and Build Optimization

This article presents a step‑by‑step tutorial for creating a Vue 3 project using Vite and TypeScript, covering project scaffolding, routing and permission control, reusable component and directive encapsulation, custom hooks, Axios configuration, build optimization techniques, and essential TypeScript concepts.

Build OptimizationComponent EncapsulationVite
0 likes · 19 min read
Comprehensive Guide to Building a Vue3 + Vite + TypeScript Project with Permission Management, Component Encapsulation, and Build Optimization
Top Architect
Top Architect
Sep 6, 2023 · Information Security

Design and Implementation of Baidu's Unified Permission Management Service (MPS)

This article details the design and development of Baidu's Unified Permission Management Service (MPS), covering requirements analysis, technology selection, architecture, platform and node management, permission models (RBAC, ACL, DAC), functional modules, API integration, audit, and deployment strategies for enterprise-wide access control.

ACLDACRBAC
0 likes · 18 min read
Design and Implementation of Baidu's Unified Permission Management Service (MPS)
Architect
Architect
Sep 4, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article details the design and development of a unified permission management service (MPS) that consolidates RBAC, ACL, and DAC models to solve fragmented enterprise permission issues, covering requirement analysis, technical selection, functional modules, deployment, and performance outcomes.

ACLDACGo
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
High Availability Architecture
High Availability Architecture
Aug 28, 2023 · Information Security

Design and Implementation of a Unified Permission Management Service (MPS)

This article presents a comprehensive design and development of Baidu's Unified Permission Management Service (MPS), detailing its requirement analysis, technical selection, hybrid RBAC/ACL/DAC model, functional modules, implementation specifics, and operational results that demonstrate its effectiveness in consolidating enterprise-wide access control.

ACLDACRBAC
0 likes · 16 min read
Design and Implementation of a Unified Permission Management Service (MPS)
Bilibili Tech
Bilibili Tech
Aug 15, 2023 · Backend Development

Bilibili Customer Service System Architecture and Implementation

The article explains Bilibili's self‑developed customer‑service platform, describing its modular architecture, core workflows, and implementation of features such as intelligent QA with Faiss vector search, Redis‑based seat scheduling, a robust workstation, permission control, and exploration of large language models, highlighting improvements in interception rate, satisfaction, and handling time.

Customer Service SystemFaiss vector searchLarge Language Models
0 likes · 20 min read
Bilibili Customer Service System Architecture and Implementation
Baidu Geek Talk
Baidu Geek Talk
Aug 14, 2023 · Information Security

Design and Implementation of Unified Permission Management Service (MPS) at Baidu

Unified Permission Management Service (MPS) at Baidu centralizes fragmented permission systems across internal platforms, integrating ACL, DAC, and RBAC models via Baidu's GDP framework, and provides modules for platform and node management, permission CRUD, workflow approvals, and audit/recovery, now serving over 20,000 users and managing more than 100,000 permission nodes.

ACLBaiduDAC
0 likes · 16 min read
Design and Implementation of Unified Permission Management Service (MPS) at Baidu
php Courses
php Courses
Jul 12, 2023 · Mobile Development

Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature

This article explains how to adapt mobile apps to the latest Ministry of Industry and Information Technology network entry rules by covering basic mode design, personal data protection, permission request practices, update notifications, and signature authenticity, while also listing example implementations from popular apps.

App UpdateRegulatory Compliancemobile app
0 likes · 6 min read
Implementation Guide for New App Network Entry Requirements: Personal Information Protection, Permission Calls, Updates, and Signature
Bilibili Tech
Bilibili Tech
Mar 10, 2023 · Information Security

Data Security Construction in Berserker Platform

The article outlines Berserker’s comprehensive data‑security framework—built on the CIA triad and 5A methodology—that unifies authentication, authorization, access control, asset protection, and auditing across Hive, Kafka, ClickHouse and ETL tasks, describes the migration from version 1.0 to 2.0 with a redesigned permission system, workspaces, Casbin performance tweaks, and previews future fine‑grained, lifecycle‑wide security enhancements.

AuthenticationAuthorizationBerserker platform
0 likes · 15 min read
Data Security Construction in Berserker Platform
Java High-Performance Architecture
Java High-Performance Architecture
Feb 9, 2023 · Backend Development

Building a High-Performance SpringBoot + layui API Automation Platform from Scratch

This article details the design and implementation of a SpringBoot‑based API automation platform with a layui front‑end, covering architecture choices, permission management, hierarchical data design, test case handling, test set execution, result reporting, and future enhancements such as scheduling, email notifications, and multithreading.

API automationLayuiSpringBoot
0 likes · 14 min read
Building a High-Performance SpringBoot + layui API Automation Platform from Scratch
Java High-Performance Architecture
Java High-Performance Architecture
Dec 16, 2022 · Backend Development

Simplify Spring Boot Permission Management with jCasbin

This guide shows how to replace Shiro with jCasbin in a Spring Boot microservice, covering Maven dependencies, configuration files, Enforcer initialization, policy handling, and a custom filter for runtime permission checks, enabling dynamic role‑based access control without server restarts.

Spring BootjCasbinjava
0 likes · 10 min read
Simplify Spring Boot Permission Management with jCasbin
Programmer DD
Programmer DD
Dec 13, 2022 · Information Security

How to Build a Low‑Code, Visual RBAC Permission System with Spring Cloud

This article explains how to design a non‑intrusive, easy‑to‑configure, fine‑grained RBAC permission system using OAuth2, JWT, and Spring Cloud micro‑services, covering architecture, expression syntax, URL patterns, and micro‑frontend integration for scalable, maintainable access control.

JWTOAuth2RBAC
0 likes · 13 min read
How to Build a Low‑Code, Visual RBAC Permission System with Spring Cloud
Java Architect Essentials
Java Architect Essentials
Oct 8, 2022 · Backend Development

Spring Boot Security Permission Management Tutorial with Role and Menu Implementation

This article provides a step‑by‑step guide to building a Spring Boot permission management system using Spring Security, Spring Data JPA, Thymeleaf and Bootstrap, covering database design, entity classes, Maven setup, security configuration, dynamic menu loading, front‑end rendering and testing with full source code examples.

Role-Based Access ControlSpring Bootpermission management
0 likes · 19 min read
Spring Boot Security Permission Management Tutorial with Role and Menu Implementation
Top Architect
Top Architect
Aug 28, 2022 · Information Security

Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures

This article explains why permission management is essential for data security, introduces various permission models including basic RBAC, role inheritance, constrained RBAC, and discusses user grouping, organization‑based roles, and detailed database schema designs for both standard and ideal RBAC systems.

Information SecurityRBACRole Inheritance
0 likes · 16 min read
Designing Permission Management and RBAC Models: From Basic Needs to Ideal Architectures
Java Architect Essentials
Java Architect Essentials
Jul 20, 2022 · Information Security

Spring Security Based System Permission Management Tutorial

This article provides a comprehensive step‑by‑step guide on building a permission management system with Spring Security, covering database design, entity classes, Maven configuration, security configuration, dynamic menu loading, front‑end rendering using Thymeleaf, and complete testing with sample code and screenshots.

AuthenticationAuthorizationSpring Boot
0 likes · 19 min read
Spring Security Based System Permission Management Tutorial
Zhuanzhuan Tech
Zhuanzhuan Tech
Jun 13, 2022 · Information Security

Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models

This article introduces the problems of the legacy permission approach at Zhuanzhuan, compares industry‑standard RBAC and ABAC models, explains the design rationale for a hybrid RBAC‑based system, and outlines the core modules, role hierarchy, and permission types for the new unified permission management platform.

ABACAuthorizationRBAC
0 likes · 15 min read
Design of Zhuanzhuan's Unified Permission Management System – Part 1: Architecture and Models
Architect
Architect
May 16, 2022 · Databases

Understanding MySQL Execution Process and SQL Execution Order

This article explains the complete MySQL execution pipeline—from client connection, authentication, and permission checks through caching, parsing, optimization, and execution—plus the logical order of SQL clauses, illustrated with diagrams to help developers optimize and comprehend database queries.

Database ArchitectureSQL Executionmysql
0 likes · 12 min read
Understanding MySQL Execution Process and SQL Execution Order
Youzan Coder
Youzan Coder
Mar 14, 2022 · Information Security

Android Privacy Protection: Privacy API and Permission HOOK Implementation Practice

To meet new Chinese privacy regulations, the article presents an mPaaS‑based solution that uses compile‑time Java HOOKs to replace privacy‑sensitive API calls and dangerous permission requests, automatically detecting and logging violations during build and runtime, and providing backend alerts and management tools for compliance.

ASMAndroidBytecode Manipulation
0 likes · 14 min read
Android Privacy Protection: Privacy API and Permission HOOK Implementation Practice
DataFunSummit
DataFunSummit
Jan 12, 2022 · Big Data

Exploring JD's Big Data Security and Distributed Permission System: Architecture, Principles, and Practices

This article presents JD's comprehensive big‑data security framework and distributed permission system, detailing the overall planning of the security center, data lifecycle protection strategies, core modules such as subjects, resources, policy language, and high‑performance access control, and how they address national compliance, business scalability, and technical challenges.

Big DataDistributed SystemsJD.com
0 likes · 11 min read
Exploring JD's Big Data Security and Distributed Permission System: Architecture, Principles, and Practices
Top Architect
Top Architect
Dec 16, 2021 · Backend Development

Designing Dynamic Role‑Based Permission Management for Frontend and Backend Systems

This article explains the shortcomings of static front‑end permission schemes in modern SPA architectures and presents a comprehensive, database‑driven user‑role‑page‑function‑API model that enables dynamic, fine‑grained access control for both frontend menus and backend endpoints.

BackendDatabase designRole-Based Access Control
0 likes · 10 min read
Designing Dynamic Role‑Based Permission Management for Frontend and Backend Systems
macrozheng
macrozheng
Nov 8, 2021 · Backend Development

How APIJSON Lets You Build Full CRUD APIs with Just 3 Lines of Code

This article demonstrates how APIJSON dramatically reduces boilerplate for typical CRUD operations by using a single generic endpoint for all request types, showing concrete SpringBoot examples, request/response JSON structures, permission configuration, and advanced query capabilities, all with minimal code.

APIJSONCRUDREST API
0 likes · 10 min read
How APIJSON Lets You Build Full CRUD APIs with Just 3 Lines of Code
macrozheng
macrozheng
Aug 19, 2021 · Backend Development

Mastering Sa-Token: Simplify SpringBoot Authentication and Authorization

This guide walks you through integrating the lightweight Sa-Token framework into a SpringBoot project, covering dependency setup, configuration, login, role and permission checks, as well as global exception handling, with complete code examples and practical screenshots.

AuthenticationAuthorizationRole-Based Access Control
0 likes · 13 min read
Mastering Sa-Token: Simplify SpringBoot Authentication and Authorization
Code Ape Tech Column
Code Ape Tech Column
Jun 18, 2021 · Information Security

Mastering RBAC: From Basic Models to Advanced Permission Architectures

This article explains the fundamentals of permission management, detailing the classic RBAC0 model and its extensions RBAC1‑RBAC3, and explores how roles, users, groups, organizations, and positions interrelate in both single‑system and distributed micro‑service architectures, including practical table designs and framework options.

AuthorizationBackend SecurityMicroservices
0 likes · 12 min read
Mastering RBAC: From Basic Models to Advanced Permission Architectures
Youzan Coder
Youzan Coder
Mar 12, 2021 · Information Security

How Youzan Re‑engineered Its Permission System for Scalable Access Control

This article examines the evolution of Youzan's permission management—from the original SAM system using a 64‑bit RBAC model to the flexible 2.0 architecture with rig, dynamic menu, and widget delegation—highlighting design choices, implementation details, challenges solved, and measurable business impact.

BackendMobile DevelopmentRBAC
0 likes · 15 min read
How Youzan Re‑engineered Its Permission System for Scalable Access Control
New Oriental Technology
New Oriental Technology
Jan 4, 2021 · Backend Development

Overview of New Oriental Architecture Department Unified Management Platform

The document provides a detailed technical overview of New Oriental's unified management platform, describing its five core modules—Redis platform, microservice platform, gateway platform, app management platform, and permission management platform—including monitoring, cluster management, service registration, and access control features.

Backend Managementpermission managementplatform architecture
0 likes · 5 min read
Overview of New Oriental Architecture Department Unified Management Platform
58 Tech
58 Tech
Nov 4, 2020 · Frontend Development

Micro‑Frontend Implementation in a Financial Management System: Architecture, Solutions, and Outcomes

This article presents a detailed case study of how a financial company adopted a micro‑frontend architecture to build a unified, low‑cost, and user‑friendly management platform, covering the motivations, design principles, technical components, deployment workflow, permission handling, and the resulting operational benefits.

DeploymentUI integrationfinancial systems
0 likes · 8 min read
Micro‑Frontend Implementation in a Financial Management System: Architecture, Solutions, and Outcomes
macrozheng
macrozheng
Oct 14, 2020 · Information Security

How Mall’s Permission Management Works: Spring Security & OAuth2 Explained

This article answers common questions about permission management in the Mall and Mall‑Swarm projects, covering deprecated tables, required SQL scripts, front‑end menu visibility, differences between Spring Security and OAuth2‑Gateway implementations, configuration fixes, token usage, and a tiny demo project for learning.

OAuth2permission managementspring-security
0 likes · 8 min read
How Mall’s Permission Management Works: Spring Security & OAuth2 Explained
Selected Java Interview Questions
Selected Java Interview Questions
Aug 12, 2020 · Information Security

Integrating Apache Shiro with Spring Boot for Permission Management

This article demonstrates how to integrate the Apache Shiro security framework into a Spring Boot application, covering Maven dependencies, Shiro configuration, custom Realm implementation, login authentication, controller-level access control, and Thymeleaf front‑end button visibility based on roles and permissions.

ShiroSpring BootThymeleaf
0 likes · 13 min read
Integrating Apache Shiro with Spring Boot for Permission Management
Java Captain
Java Captain
Jul 19, 2020 · Backend Development

Base Admin: A Simple Generic Backend Management System Overview

The article introduces Base Admin, a lightweight backend management platform built with SpringBoot, Thymeleaf, WebSocket and Spring Security, detailing its technology stack, project structure, core features such as permission and menu management, real‑time logging, monitoring, API encryption, and recent updates.

BackendSpringBootWebSocket
0 likes · 7 min read
Base Admin: A Simple Generic Backend Management System Overview
360 Tech Engineering
360 Tech Engineering
Apr 28, 2020 · Mobile Development

Understanding and Implementing Dynamic Permissions in Android

This article explains the concept, history, and implementation of Android dynamic (runtime) permissions, detailing the evolution of permission models, code examples for checking and requesting permissions, handling callbacks, compatibility across Android versions and OEM customizations, and best‑practice strategies for developers.

AndroidDynamic PermissionsKotlin
0 likes · 19 min read
Understanding and Implementing Dynamic Permissions in Android
dbaplus Community
dbaplus Community
Apr 20, 2020 · Operations

Preventing Database Disasters: Key Lessons from the Zhengda Hospital Outage

The Zhengda Hospital HIS database outage, caused by unauthorized scripts and poor permission controls, sparked a detailed discussion on how to prevent reckless production testing, enforce proper authorization, design efficient yet secure workflows, improve outsourcing oversight, and build robust emergency and compliance practices.

Database operationsDevOpsProduction Security
0 likes · 12 min read
Preventing Database Disasters: Key Lessons from the Zhengda Hospital Outage
ITPUB
ITPUB
Feb 26, 2020 · Information Security

What We Learned from the Weimeng Data Deletion Disaster: Backup and Permission Strategies

The article analyzes the recent Weimeng database deletion incident, explains why recovery took 36 hours, and provides practical guidance on backup practices, minimal‑privilege management, and cloud‑based disaster recovery to prevent similar data loss in small and large organizations.

BackupDatabase SecurityInformation Security
0 likes · 9 min read
What We Learned from the Weimeng Data Deletion Disaster: Backup and Permission Strategies
Programmer DD
Programmer DD
Feb 26, 2020 · Information Security

Inside the Weimob Data Deletion: Lessons on Permissions and Backup

A malicious insider deleted Weimob's primary and backup databases, prompting a slow recovery effort and highlighting the critical need for stricter permission controls and reliable backup mechanisms to prevent similar incidents.

Data lossInformation Securitybackup strategy
0 likes · 5 min read
Inside the Weimob Data Deletion: Lessons on Permissions and Backup
Architecture Digest
Architecture Digest
Jan 22, 2020 · Information Security

Permission System Design and RBAC Models

This article explains the fundamentals of permission system design, covering the core RBAC0 model, its extensions RBAC1, RBAC2, RBAC3, as well as user groups, organizational structures, authorization processes, database schema considerations, and common implementation frameworks for secure backend access control.

RBACRole Hierarchyaccess control
0 likes · 12 min read
Permission System Design and RBAC Models
Youzan Coder
Youzan Coder
Aug 28, 2019 · R&D Management

How to Standardize Mobile Release Permissions and Approval with a Unified Platform

To avoid duplicated effort across multiple mobile platforms, the article proposes a unified permission and approval management system that abstracts module identifiers, user roles, and release workflows, detailing the interaction flow, interface design, and optimization measures such as permission request shortcuts and configurable approval toggles.

DubboMobile DevelopmentPlatform Integration
0 likes · 11 min read
How to Standardize Mobile Release Permissions and Approval with a Unified Platform
21CTO
21CTO
Apr 11, 2019 · Backend Development

Build a Secure Permission System with SpringBoot, MyBatis & Shiro

This article introduces the open‑source renren‑security permission management solution, detailing its architecture, core modules, and how to implement authentication and authorization with Apache Shiro in a SpringBoot‑MyBatis stack, including code examples for login, role‑based access, XSS/SQL filtering, and deployment options.

ShiroSpringBootjava
0 likes · 9 min read
Build a Secure Permission System with SpringBoot, MyBatis & Shiro
21CTO
21CTO
Jan 11, 2018 · Information Security

What Is Permission? Uncovering the Core of Access Control

This article explains the fundamental nature of permissions as limited authorized access to protected resources, defines what constitutes a resource in software, outlines permission classifications by method and layer, describes the control model using receptor‑ligand analogy, and summarizes the three core components of a permission system.

AuthorizationSoftware Securityaccess control
0 likes · 7 min read
What Is Permission? Uncovering the Core of Access Control
StarRing Big Data Open Lab
StarRing Big Data Open Lab
Jun 9, 2017 · Big Data

Secure HDFS with Guardian 5.0: Complete Permission and Quota Guide

This article explains why Hadoop security is critical, introduces Guardian 5.0’s unified authentication and authorization framework, and provides step‑by‑step instructions for configuring HDFS permissions and quotas through its web UI, helping administrators protect massive data assets efficiently.

Guardian5.0HDFSHadoop
0 likes · 9 min read
Secure HDFS with Guardian 5.0: Complete Permission and Quota Guide
MaGe Linux Operations
MaGe Linux Operations
Oct 9, 2016 · Databases

How to Simplify Permission Management with MariaDB Roles

This article explains why database roles are essential for efficient permission handling, outlines the benefits of using roles, and provides step‑by‑step instructions with screenshots for creating and assigning roles in MariaDB, while noting MySQL's current lack of support.

Database RolesMariaDBUser Administration
0 likes · 3 min read
How to Simplify Permission Management with MariaDB Roles
Tencent Music Tech Team
Tencent Music Tech Team
Aug 5, 2016 · Information Security

Self-Service Security System for a Social Karaoke App: Design and Implementation

The karaoke app’s new self‑service security system empowers trusted external community members with limited, quota‑based moderation permissions, reusing the existing reporting channel to automatically prioritize and process malicious content, cutting urgent incident response from 20 minutes to sub‑second and reducing daily missed issues from dozens to a few.

automationcontent moderationmobile app
0 likes · 8 min read
Self-Service Security System for a Social Karaoke App: Design and Implementation