基于角色访问控制(RBAC)是一种方便、安全、高效的访问控制机制。
Role -based access control (RBAC) is a kind of access control mechanism which is convenient, secure and of high -performance.
在基于角色访问控制的几种主要模型的基础上,提出了一种基于时间的角色访问控制模型。
Synthesizes main models of role - based aceros control and designs a time role - based access control model which is called TRBAC model.
提出从静态、功能需求、动态观点来分析模型,并利用UML来表示基于角色访问控制模型。
Present the RBAC model with this well-known modeling language UML , and specify the RBAC model with three views: static view, functional view, and dynamic view.
标准的基于角色访问控制(RBAC)通过角色对用户和权限进行解耦,从受控资源角度来讲是一维的。
The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.
文中结合信息系统开发实例,详细介绍了该方法在被动式的基于角色访问控制中的实现原理及其使用方法。
The realization theory and access mechanism of the method in passive role-based access control are elaborated by an information system development example.
提出一个基于逻辑程序和基于角色访问控制并且具有柔性授权、逻辑形式化和策略集成特点的柔性授权框架。
A flexible authorization framework based on logic programs and RBAC, with flexible authorization, logic-based formalization and integration of policies, was proposed.
访问控制策略是网络安全策略的重要组成部分,基于角色访问控制策略以其方便有效的特点日益受到人们的关注。
Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
在基于角色访问控制的基础上,利用DBMS的审计功能,将用户审计信息与实际的权限管理信息相比较,从而侦测出内部合法用户的滥用行为。
On RBAC, using the audit function of DBMS, by comparing user's audit to the authorization administration information, this System can detect user's misuse behavior to DBMS.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
我们的客户同时利用基于角色的权限和细粒度访问控制。
Our clients take advantage of both role-based permission and fine-grained access control.
在AIX 6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
基于角色、用于用户治理和访问控制的设施。
作为对基于标签的访问控制(LBAC)的DB 2 Viper 2数据库角色增强的一部分,可以对一个角色或组授予或收回安全标签或豁免权。
As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.
这会启用基于角色的视图和访问控制,后者与许多Registry andRepository治理功能绑定在一起。
This enables role-based views and access control, and this is tied to many of Registry and Repository governance capabilities.
AIX提供了一种功能,可通过基于角色的访问控制(RBAC)机制将管理角色委托给非root用户。
AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.
您已经了解到WebSphereServiceRegistry andRepository如何提供基于角色的访问控制,以及如何使用它来管理服务以及与服务相关的实体(如契约)。
You learned how WebSphere service Registry and Repository provides role-based access control and how it can be used to manage services and service-related entities such as contracts.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
另一种控制访问的方法是基于角色的访问控制(RBAC)。
Another approach to controlling access is role-based access control (RBAC).
对于不需要基于角色的访问控制,并且只实现一个加密密钥的简单应用程序,那么可以将一个用户出口用于所有加密和解密函数。
For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.
基于角色的访问控制(RBAC)作为一种安全机制,是当前研究的热点之一。
As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.
基于角色的访问控制 (RBAC)
介绍了自主访问控制、强制访问控制和基于角色的访问控制三种主流的访问控制策略,并进行了对比分析。
This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.
在RBAC模型的基础上,提出一种基于岗位和角色的两级访问控制模型——PRBAC。
On the basis of RBAC model, this paper put forward a new model PRBAC, which was a twolevel model based on the post and role.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
从实验室教学管理系统的特点出发,讨论了基于角色的访问控制模型RBAC在实验室教学管理系统中应用的优势。
Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
应用推荐