• 不管应用程序访问控制基于密码还是基于角色需要一个登录注销系统处理用户身份验证

    Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.

    youdao

  • 认为软件架构师重要事情小心思考应用程序业务角色,将它们紧紧地映射一个基于角色访问控制系统

    In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.

    youdao

  • 我们客户同时利用基于角色权限细粒度访问控制

    Our clients take advantage of both role-based permission and fine-grained access control.

    youdao

  • AIX 6.1中,IBM引入了基于角色访问控制(RBAC),解决了sudo许多安全和审计问题

    In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.

    youdao

  • 基于角色用于用户治理访问控制设施

    Role based facility for governance and access control.

    youdao

  • 作为基于标签访问控制(LBAC)的DB 2 Viper 2数据库角色增强一部分可以一个角色授予收回安全标签豁免权

    As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.

    youdao

  • 这会启用基于角色视图访问控制后者许多Registry andRepository治理功能绑定在一起。

    This enables role-based views and access control, and this is tied to many of Registry and Repository governance capabilities.

    youdao

  • AIX提供了一种功能,可通过基于角色访问控制(RBAC)机制管理角色委托给非root用户

    AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.

    youdao

  • 已经了解WebSphereServiceRegistry andRepository如何提供基于角色访问控制以及如何使用管理服务以及与服务相关的实体(契约)。

    You learned how WebSphere service Registry and Repository provides role-based access control and how it can be used to manage services and service-related entities such as contracts.

    youdao

  • WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    youdao

  • 现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录定义用户角色控制功能访问应用程序

    You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.

    youdao

  • 另一种控制访问方法基于角色访问控制(RBAC)。

    Another approach to controlling access is role-based access control (RBAC).

    youdao

  • 对于需要基于角色访问控制并且实现加密密钥简单应用程序那么可以一个用户出口用于所有加密解密函数

    For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.

    youdao

  • 基于角色访问控制(RBAC)作为安全机制当前研究热点之一

    As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.

    youdao

  • 基于角色访问控制 (RBAC)

    Role-based access control (RBAC)

    youdao

  • 介绍自主访问控制强制访问控制基于角色访问控制三种主流访问控制策略进行了对比分析。

    This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.

    youdao

  • RBAC模型基础上提出一种基于岗位角色的两级访问控制模型——PRBAC

    On the basis of RBAC model, this paper put forward a new model PRBAC, which was a twolevel model based on the post and role.

    youdao

  • 安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    youdao

  • 提出基于认证可信度角色访问控制模型(AT - RBAC)。

    A new model, role access control model based on authentication trustworthiness (AT-RBAC) is proposed in the paper.

    youdao

  • 实验室教学管理系统特点出发,讨论基于角色访问控制模型RBAC实验室教学管理系统中应用的优势

    Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.

    youdao

  • 文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    youdao

  • 系统采用了信任机制基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    youdao

  • 标准基于角色访问控制RBAC通过角色用户权限进行解耦,受控资源角度来讲一维的。

    The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.

    youdao

  • 借鉴基于角色访问控制基本思想,结合开发实践,提出一种VJ实现用户权限管理方法

    Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.

    youdao

  • 限制可以视为基于角色访问控制(RBAC)主要动机

    Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).

    youdao

  • 研究了相关的技术基础SNMP协议HTTP协议代理服务技术以及基于角色访问控制模型;

    Some techniques such as SNMP, HTTP, proxy's basic theory and role-based access control are introduced.

    youdao

  • 论文提出一种新的访问控制模型基于资源抽象角色访问控制模型(RD_RBAC)。

    A new model, role access control model based on resource abstract (RD_RBAC), is proposed in the paper.

    youdao

  • 论文研究基于角色访问控制技术及其法院系统中的应用

    The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.

    youdao

  • 基于角色访问控制一种强制形式的访问控制操作系统层次上数据库中已经存在大量应用,并且取得了好的效果

    Role Based access control is an compulsive access control. There are lots of its application in operation system level and database, being of much effect in these aspects.

    youdao

  • 基于角色访问控制一种强制形式的访问控制操作系统层次上数据库中已经存在大量应用,并且取得了好的效果

    Role Based access control is an compulsive access control. There are lots of its application in operation system level and database, being of much effect in these aspects.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定