还提供了通过策略实现的服务安全访问控制。
Secure access control for services using policies is also provided.
文件安全访问控制,是银行自动柜员机安全的核心部分。
File security access control is the core of the bank automatic teller machine security.
基于这一点,外汇市场系统网络安全访问控制技术显得更加重要。
On this point, the technology of network safe access control in the exchange transaction becomes more important.
本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制。
It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.
针对P 2 P网络应用环境特点,提出了一种分布式安全访问控制模型。
We design a distributed access control model according to the character of the P2P networks.
传统的RBAC访问控制模型已经不能表达复杂的工作流安全访问控制约束。
The traditional RBAC model cannot express complicated workflow secure access control constraint.
目前针对IP组播的安全访问控制问题的解决方案只是实现了对组播接收者的访问控制。
The current secure access control techniques in IP multicast just implemented the access control to multicast receivers.
随着信息技术在风力发电中的应用,风电场SCADA系统的安全访问控制变得越来越重要。
With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.
文中从角色、角色继承、授权等方面分析了如何利用RBAC实现对XML文档的安全访问控制。
This paper analyzes how to realize secure access control for XML documents using RBAC from aspects of role, role hierarchy, authorization, etc.
通过分析r BAC模型结构,提出并设计实现了统计管理系统中数据库安全访问控制的新方法。
A novel method for designing and implementing database safe access control in a statistic management system is proposed on the basis of analyzing RBAC model.
本文提出了一种将PK I技术与RBAC技术相结合的方案,实现了基于身份认证的安全访问控制。
This paper has presented a scenario that using PKI technology to RBAC and implicating the PKI makes security authorized access control.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
本文从理论上研究了RBAC的概念模型,并与传统的安全访问控制相比较,论证了在企业信息系统中采用RBAC的必要性。
We analyze RBAC concept model, compare it with traditional access control scheme, and demonstrate the necessity of implement RBAC in Enterprise Information Systems.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
存在几种不同的安全领域,每个领域都有不同的访问控制和限制。
There will be several different security domains, each of which have different access controls and restrictions.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
它使您可以安全访问和控制远程数据中心的所有服务器、路由器、交换机和电源设备,让您能够纠正问题。
It enables you to rectify the problem by providing you with secure access to and control of all servers, routers, switches, and power devices in your remote data centers.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Some file systems support advanced security features, such as access control lists (ACLs).
访问控制规则被配置为安全规则。
服务器端需要查询语法、选择操作的完整实现,以及为了数据安全而需要的访问控制和事务支持功能。
The server side requires a complete implementation of the query syntax, selection as well as access control and transaction support required to expose the data safely.
安全策略用于访问控制检查,这是由JVM在运行时执行的。
The security policy is used for access control checks, which are performed by the JVM at runtime.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
例如,您需要使用网络安全加密令牌控制对ejb的访问。
For example, you need to control access to EJBs using a network-safe encrypted token.
除了简单地提供商务逻辑之外,应用程序必须支持访问安全控制,数据持久化,事务,和其它的进阶功能。
Beyond simply providing business logic, applications must support secure access, persistence of data, transactional behavior, and other advanced features.
OmniFind可以配置来将文档与安全令牌或访问控制列表相关联。
OmniFind can be configured to associate documents with security tokens or access control lists.
它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。
It also contains security namespace information and access control policies on all the Cognos objects.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
在本例中,cglib2aopproxy类将创建安全bean访问控制所需的代理对象。
In this case, the Cglib2AopProxy class creates the proxy objects you will need to control access to your secure beans.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
应用推荐