After categories are established, access control rules can be written and enforced.
分类建立后,就可以写入和执行访问控制规则。
In this case, the mobile cloud conceivably can enhance enforcement of access control rules.
这种情况下,移动云会理所当然地增强访问控制规则的实施。
The methods of describing access control rules and policies under this frame - work are also given.
论文介绍了在该框架下描述访问控制规则及策略的方法。
You can capture Access Control Rules in XACML and reference life cycle states and semantic annotations such as classifications, and properties.
您可以在XACML 中捕获访问控制规则,并引用生命周期状态和诸如分类及属性等语义标注。
Identity and access database is the LDAP database which stores information of users, groups, roles, resources, functions and access control rules and so on.
身份与权限数据库是一个LDAP数据库,用于存储用户身份、用户组、角色、资源、功能和访问控制规则等信息。
An online policy holds one or more encryption keys and rules for access control.
在线策略包含一个或多个加密密匙以及访问控制规则。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.
自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。
Filtering based on portal access control or personalization rules would be more efficient here.
此处根据门户访问控制或个性化规则进行筛选会更为有效。
Rules for access control are configured as Security Rules.
访问控制规则被配置为安全规则。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
IBM InfoSphere Guardium encryption Expert protects data with a policy that contains one or more encryption keys and one or more rules for access control.
IBMDatabaseEncryptionExpert使用包含一个或多个加密密匙和一个或多个访问控制规则的策略保护数据。
The policies that encryption Expert USES contain one or more encryption keys and one or more rules for access control. There are two types of policies.
EncryptionExpert使用的策略包含一个或多个加密密匙,以及一个或多个用于访问控制的规则。
If the client is allowed access based on the allowed rules, then TCPD hands over control to the real daemon that was called (in this case, telnetd).
如果该客户端符合允许访问规则,那么tcpd就会交出对所调用的实际守护进程的控制权(本例中是telnetd)。
ACLs use access control entries (ACE) to control user and group access and denial. Though more commonly known as rules, they are.
ACL使用访问控制条目(ace)控制用户和组的访问权。
Expresses access-control rules as simple XML documents.
将访问控制规则表示为简单的XML文档。
When you get the set of all audit rules for an event, the set contains the minimum number of rules currently required to express all the access control entries.
在获取某个事件的所有审核规则的集合时,该集合包含当前表示所有访问控制项所需要的最低数量的规则。
When you get the set of all audit rules for a registry key, the set contains the minimum number of rules currently required to express all the access control entries.
在获取某个注册表项的所有审核规则的集合时,该集合包含当前表示所有访问控制项所需要的最低数量的规则。
The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).
安全管理员可以通过应用protectedobjectpolicies (POP)和access controllists (acl)规则来指定安全等级。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
Improve the rules of comparing the security label, which meet the practical demand of the Access Control for spatial database.
改进了安全级比较的规则,使得更适合现实中空间数据存取控制的需求。
After analyzing the excessive filtering rules, a solution to increase the performance of network access control equipment is proposed.
分析过量规则对网络访问控制设备性能的影响,讨论针对这一问题的解决方法。
The paper puts forward a delegation logic based access control model (DLBAC). It translates the credentials, RBAC elements and access policies into unified delegation logic rules.
提出了一种基于委托逻辑的访问控制模型——dlbac,将凭证、RBAC元素和访问策略转化为统一的委托逻辑规则。
In this model, the access rules and the access control attributes are defined. The relations for the access control are set up.
该模型为本体中的类定义了访问规则和访问控制属性,并由此建立了访问控制关系。
Section 7.2.5, "Access Control, Stage 2: Request Verification", describes the rules for this.
第7 . 2.5节“访问控制,阶段2:请求验证”描述了这一点的规则。
It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.
统一描述策略元素和安全规则,支持多种访问控制模型,体现了良好的通用性。
The access control algorithm is used to conduct XML document protection according to the security rules.
访问控制算法根据安全规则对XML文档实施保护。
The access control algorithm is used to conduct XML document protection according to the security rules.
访问控制算法根据安全规则对XML文档实施保护。
应用推荐