Tagged articles
7 articles
Page 1 of 1
dbaplus Community
dbaplus Community
May 2, 2026 · Artificial Intelligence

Inside Claude Code: A Deep Dive into Its Powerful Agent Architecture

This article provides a comprehensive technical analysis of Claude Code, covering its project scale, two‑layer agent loop design, five design principles, tool system architecture, fine‑grained permission model, multi‑agent collaboration strategies, context‑engineered system prompts, and a custom React‑based terminal UI, all illustrated with concrete code excerpts and diagrams.

AI AgentAgent LoopClaude Code
0 likes · 38 min read
Inside Claude Code: A Deep Dive into Its Powerful Agent Architecture
JavaEdge
JavaEdge
Mar 26, 2026 · Information Security

How Claude Code’s Automatic Permission System Balances Security and Usability

The article analyzes Claude Code’s new automatic permission mode, detailing its three operation options, two‑layer classifier architecture, threat model, decision flow, rule customization, evaluation results, design trade‑offs, and future plans for improving AI‑driven security.

AI securityAutomated approvalClaude Code
0 likes · 10 min read
How Claude Code’s Automatic Permission System Balances Security and Usability
21CTO
21CTO
Jul 2, 2021 · Fundamentals

Mastering RBAC: From Basic Models to Advanced Permission Design

This article explains the fundamentals of permission management, detailing RBAC models, user‑role‑permission relationships, organization and position structures, authorization workflows, database schema design, and popular security frameworks for building robust backend access control systems.

Permission ModelRBACaccess control
0 likes · 12 min read
Mastering RBAC: From Basic Models to Advanced Permission Design
Selected Java Interview Questions
Selected Java Interview Questions
Sep 1, 2020 · Information Security

Design of Permission System and RBAC Models

This article explains the fundamentals and extensions of role‑based access control (RBAC), covering user, role, permission, organization, and group models, authorization workflows, database schema, and common frameworks such as Apache Shiro and Spring Security for building robust permission systems.

AuthorizationPermission ModelRBAC
0 likes · 12 min read
Design of Permission System and RBAC Models
Laravel Tech Community
Laravel Tech Community
Aug 8, 2020 · Information Security

Understanding RBAC Permission Models and Authorization Processes

This article explains the core RBAC0 model and its extensions (RBAC1, RBAC2, RBAC3), discusses user groups, organizations and positions, and outlines manual and approval-based authorization workflows along with a sample database schema for implementing role‑based access control in complex systems.

AuthorizationInformation SecurityPermission Model
0 likes · 10 min read
Understanding RBAC Permission Models and Authorization Processes
ITPUB
ITPUB
Feb 15, 2019 · Information Security

How Meituan Built a Scalable Data Security Platform with a Plug‑in Permission Model

This article details Meituan's data security platform architecture, explaining why traditional ACL and RBAC models fall short for data‑level control, how a new hierarchical permission model and plug‑in services were designed, and the microservice, caching, and high‑availability techniques used to support flexible, high‑QPS data governance across multiple business lines.

MicroservicesPermission Modelaccess control
0 likes · 18 min read
How Meituan Built a Scalable Data Security Platform with a Plug‑in Permission Model
Meituan Technology Team
Meituan Technology Team
Feb 14, 2019 · Information Security

Design and Architecture of Meituan's Data Security Permission Platform

Meituan’s data security permission platform introduces a hierarchical, fine‑grained model that unifies approval, permission, and audit functions across business lines, using a plug‑in service layer, micro‑service architecture, and high‑availability mechanisms such as caching, load balancing, and distributed locks to protect data assets.

MicroservicesPermission Modelaccess control
0 likes · 17 min read
Design and Architecture of Meituan's Data Security Permission Platform