核心层可提供用于构建具有访问、审核和加密控制的中间层的基础。
The core layer provides a foundation upon which you build the middle layer with access, audit, and cryptographic controls.
自websphereCommerce 5.5起,访问控制基础结构得到了增强,提供了策略组订阅功能。
Since WebSphere Commerce 5.5, the access control infrastructure has been enhanced with the policy group subscription feature.
在此基础上,Spring2.5又加入了两个新的注解 —— @Service和@Controller来完成为通常的三层架构(数据访问对象、服务、web控制器)角色委任。
Spring 2.5 adds two new annotations - @Service and @Controller - to complete the role designations for a common three-tier architecture (data access objects, services, and web controllers).
为了防止误用,部署基础设施和注册中心也都需要访问控制。
Both the deployment infrastructure and the registry also need access control, to prevent misuse.
它代表了访问资源的发起者,并为JAAS框架中的访问控制决策建立了基础。
It represents the originator of access to resources and forms the basis for access control decisions in the JAAS framework.
在审计术语中,控制没有技术上的标准,而只是一些过程,通过它们可以访问标准,并在一定周期的基础上进行审阅。
In auditing lingo, controls are not technological measures, but are the processes by which technological measures are assessed and reviewed on a periodic basis.
当配置服务在服务器外运行时,并没有对其实施访问控制,因为管理安全基础结构是在服务器内运行。
When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.
基础设施:在为非db 2目标配置q复制时,会在目标系统上创建多个QApply控制表,并通过别名就像访问目标表一样地访问控制表。
Infrastructure: When you configure Q replication for non-DB2 targets, several Q Apply control tables are created on the target system and accessed through nicknames just as target tables are.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
最后,在方案设计基础上实现本认证与访问控制系统,结合RADIUS认证服务器构建实验系统平台。
At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.
在此临时授权模型基础之上,我们详细讨论了XML访问控制的若干技术问题。
Based on this provisional authorization model, several problems of XML access control technology are discussed in detail.
本文在研究r BAC访问控制模型的基础上,设计了一种应用于电力MIS系统的RBAC模型。
A sort of RBAC model for electric power MIS was designed on the basis of studying access control models.
论文在自主开发的空间数据库VISTA的基础上针对特定的对象-关系型数据结构,提出了相应的访问控制方法。
This paper describes the access control method for the specific relational-object data structure on the base of the self-developed spatial database, VISTA.
标记是实现多级安全系统的基础,实施强制访问控制的前提。
Labels are the foundation for implementing multilevel systems and the prerequisite of enforcing mandatory access control in secure systems.
在此基础上,本文设计并实现了一个XML访问控制系统——XACS。
Based on this, this paper designed and implemented an XML access control system named XACS.
论文在对自主访问控制、强制访问控制和基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择并实现了基于角色的权限管理系统。
This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.
在RBAC模型的基础上,提出一种基于岗位和角色的两级访问控制模型——PRBAC。
On the basis of RBAC model, this paper put forward a new model PRBAC, which was a twolevel model based on the post and role.
研究了相关的技术基础,如SNMP协议,HTTP协议,代理服务技术以及基于角色访问的控制模型;
Some techniques such as SNMP, HTTP, proxy's basic theory and role-based access control are introduced.
该协议基于现有的以太网硬件基础,在应用层构造虚拟令牌,利用令牌控制来解决网络的访问冲突问题。
This protocol is based on current hardware foundation of Ethernet and solves access conflict through token-control by creating virtual token on application layer.
身份认证是一个完善的安全系统的重要组成部分,是第一道安全屏障,它是安全通信和访问控制的基础。
Identity authentication is an important part of a perfect secure system, the first defense, and the foundation of secure communication and access control.
论文首先分析了现有操作系统的访问控制技术,然后在传统访问矩阵模型的基础上,讨论了三维访问矩阵模型,提出了基于程序的访问控制思想。
In this article, we firstly analyze access control technology of current operating system. Then we discuss the three dimension access model, based on traditional access control model.
在建筑管理信息系统中,对基础数据的访问权限控制是一个重要的内容。
It is very important to control the access to base data of the corporation in construct management information system.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
该文介绍了RBAC与代理机制相结合所带来的授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型。
This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.
在此基础上给出一个基于组织建模的企业级信息系统访问控制模型,定义了一组模型要素并给出了实现访问控制的机理。
Then, an access control model based on organization modeling for enterprise information systems is proposed, the elements are defined and the mechanism for realizing control access is advanced.
文中从实际应用出发,分析了现有的访问控制技术并在此基础上提出一种新的基于信任域的P2 P访问控制模型。
In this paper, analyses the technique of access-control requirements in such environments and proposes a trust domain-based access control framework for P2P environment.
基于文件血统的访问控制机制是近年来提出的一种全新的控制思路与方法,本文是在此基础上,提出了基于血统机制的文件模型。
The access control based on file lineage mechanism is a new ideas and method in recent years, and a file lineage model is presented.
在对文档进行分类的基础上,定义了一种双角色的基于角色的访问控制模型,并给出了此模型的数据流图及部分以XACML形式表示的控制策略。
Based on the classifying of the protected documents, a DR-RBAC model is defined, and its data-flow diagram and two examples of PolicySets expressed by XACML are given out.
在现有的访问控制系统模型的基础上,提出了一个使用数字水印进行资源远程访问控制的方案。
Based on the access control model, we proposed a remote access control scheme for resources using digital watermarking.
应用推荐