同时,随着在JVM中引入了多进程能力(请参阅参考资料),出现了对基于用户的访问控制的要求。
Also, with the work done on introducing multiprocessing capabilities to the JVM (see Resources) came the requirement for user-based access control.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
这允许基于用户限制操作,从而提供更细粒度的用户访问控制。
This allows actions to be restricted on a per-user basis, allowing fine-grained control over which user can access which action.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
基于角色、用于用户治理和访问控制的设施。
AIX提供了一种功能,可通过基于角色的访问控制(RBAC)机制将管理角色委托给非root用户。
AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
对于不需要基于角色的访问控制,并且只实现一个加密密钥的简单应用程序,那么可以将一个用户出口用于所有加密和解密函数。
For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
系统实现了基于ACL的访问控制,支持部门、用户、群组及用户访问权限的动态配置与管理。
The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
标准的基于角色访问控制(RBAC)通过角色对用户和权限进行解耦,从受控资源角度来讲是一维的。
The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
基于保护位的自主型访问控制,很难实现基于单个用户制定全局安全策略。
Finally, discrete access control based on protection bits can't provide global secure policy based on individual user.
借鉴基于角色的访问控制基本思想,结合开发实践,提出了一种用VJ实现用户权限管理的方法。
Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.
在基于角色访问控制的基础上,利用DBMS的审计功能,将用户审计信息与实际的权限管理信息相比较,从而侦测出内部合法用户的滥用行为。
On RBAC, using the audit function of DBMS, by comparing user's audit to the authorization administration information, this System can detect user's misuse behavior to DBMS.
本文通过对SSL及其关键技术的研究,提出了在网络数据库系统的用户访问控制中使用基于SSL和证书的双向身份认证。
Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.
该模型从用户证书、时间约束、XML文档分类等方面对传统的RBAC模型进行了扩展,以实现基于内容的时间上下文敏感的多粒度访问控制。
This model extends the traditional RBAC model with user credentials, temporal constraints and XML document classification to enforce a content-based time-aware multi-granularity access control.
该方案对用户的认证是基于用户的权限进行的,定义了良好的资源访问控制模式,非常适合实际系统对内部网络用户有认证要求的场合。
The scheme is based on the user access control and it defines a fine access control mode. It is very suitable for the case that need to authenticate the user of the private network.
研究了ENUM用户隐私信息的保护,对ENUM记录资源访问进行权限控制,提出了基于用户认证的ENUM记录级授权访问解决方案。
Do some research on the protection of the private information of ENUM users and the access control of ENUM resource record, and propose a solution based on the authentication of ENUM record access.
基于规则和角色的访问控制模型RB-RBAC在RBAC模型的基础上引入了用户属性和授权规则,使得用户-角色分配能够自动完成。
Rule-based RBAC (RB-RBAC) modifies RBAC and introduces user attributes and rules to automatically assign users to roles. But there are still shortcomings in RB-RBAC.
对基于XML的多源异构数据融合、遥感数据存储、数据持久化以及用户访问控制技术进行了分析和设计;
This paper analyzed critical technology: heterogeneous data fusion based on XML, remote sensing data storage, data persistence and user access control;
基于角色的访问控制(RBAC)中,根据组织中不同的工作岗位创建角色,用户的责任与能力,用户被分配到不同的角色。
The roles based on access control are created for the various job functions in an organization and users are assigned roles on their responsibilities and qualifications.
基于新的浏览器的网络控制模块简化了多用户访问的部署,并且提供一个可编辑定制的用户界面。
A new browser-based host module for the OnGuard Visitor application offers simplified deployment and a customizable user interface.
基于访问控制表(ACL)的细粒度自主访问控制机制可以实现针对单个用户或用户组的访问授权,但是在实际使用中可能造成不适当授权或权限撤销不及时的缺陷。
Fine-granularity discretionary access control based on Access Control List (ACL) may grant authority to one user or group, but it may grant unapt authority or remove authority not timely.
使用其他角色名称(需要基于角色的访问控制(RBAC),将在下一节说明)的已授权用户,将会调用[[yii \web \ user: can ]]。
Using other role names requires RBAC (to be described in the next section), and [[yii \ web \ User: : can ]] will be called.
使用其他角色名称(需要基于角色的访问控制(RBAC),将在下一节说明)的已授权用户,将会调用[[yii \web \ user: can ]]。
Using other role names requires RBAC (to be described in the next section), and [[yii \ web \ User: : can ]] will be called.
应用推荐