授权和访问控制的粒度粗细不等。
Authorization and access control can vary from coarse - to fine-grained.
本文中授权和访问控制是等同的。
联邦授权和访问控制的XACML(可扩展访问控制标记语言)。
XACML (Extensible access control Markup Language) for federated authorization and access control.
它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。
They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.
该系统满足了统一授权和访问控制的需求,具有安全性好、灵活性高、便于管理等特点。
The system meets the demands of uniform authorization and access control, possessing the merits of good security, high flexible and easy to management.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
如果只有中间层服务的标识传播到下游服务,则下游服务不能对服务访问审核和授权进行正确的控制。
If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.
目前多数系统都以专有的方式实现访问控制和授权。
Most of the current systems implement access control and authorization in a proprietary manner.
XACML的初衷是开发一项访问控制和授权系统的标准。
XACML is an initiative to develop a standard for access control and authorization systems.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
本文借助示例演示了权限集合和访问控制列表,并授权给 CM实体,如用户、用户组、项目类型、项目、工作流等。
With the help of examples, this article highlights privilege sets and Access Control Lists (ACLs) to be granted to CM entities like users, usergroups, itemtype, item, workflow, and so on.
在Gluecode标准版中可以定义多个安全域,然后通过提供一套访问控制主体,对用户进行身份验证和授权。
Multiple security realms can be defined in Gluecode Standard Edition to authenticate and authorize users by providing a set of principals for access control.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
典型的访问控制和授权场景包括三个主要实体:主体、资源和动作以及它们的属性。
A typical access control and authorization scenario includes three main entities — a subject, a resource, and an action — and their attributes.
有版本控制和访问控制:只有授权用户才能查看和修改应用程序定制项的值。
Revisioning and access control: Only appropriate users should be able to view and edit the values assigned to an application's customization points.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
设置细颗粒度的授权和角色访问控制,惠普保护系统减少了配置时间和客户所需的技能水平要求。
By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.
PMI体系和模型的核心内容是实现授权与访问控制的有效管理。
The important content of PMI(Privilege Management Infrastructure) and model is to realize the efficient management of authorization and access control.
系统组件由授权管理系统、身份认证服务器和访问控制服务器三大部分组成。
System component includes authorization management system, identification authentication server and access control server.
从身份认证和访问控制入手,结合PKI和RBAC技术,提出了一种针对电子病历的基于身份的授权模型。
An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.
提出了一个安全数据库访问控制模型,包括一个多层关系模型和一个用以增强自主访问控制能力的元素级粒度的授权。
In this paper, we proposed a formal security database system access model including a multilevel relation model and a element-level authorization.
后门是一个软件程序,使黑客未经授权访问的机器和手段,远程控制的机器在用户不知道。
Backdoor is a software program that gives an attacker unauthorized access to a machine and the means for remotely controlling the machine without the user's knowledge.
有许多不同的办法来解决已经存在的访问控制和授权问题。
There are many different preexisting solutions to the problem of access control and authorizations.
提出一个基于逻辑程序和基于角色访问控制并且具有柔性授权、逻辑形式化和策略集成特点的柔性授权框架。
A flexible authorization framework based on logic programs and RBAC, with flexible authorization, logic-based formalization and integration of policies, was proposed.
因此,必须要有一种统一的授权访问控制平台,为各应用系统实现统一授权管理和访问控制。
So, there must be a uniform platform to realize the user authorization and access control, to provide the uniform user authorization and access control service for all the other systems.
这两种技术在单点访问系统中实现身份认证和访问授权控制功能。
The PKI and PMI can provide functions of authentication and authority in the SAS.
认证、授权和计费(AAA)协议,如TACACS和RADIUS,当初是为了对终端访问服务和PPP拨号服务实行访问控制而开发的。
Authentication, Authorization and Accounting (AAA) protocols such as TACACS and RADIUS were initially deployed to provide dial-up PPP and terminal server access.
认证、授权和计费(AAA)协议,如TACACS和RADIUS,当初是为了对终端访问服务和PPP拨号服务实行访问控制而开发的。
Authentication, Authorization and Accounting (AAA) protocols such as TACACS and RADIUS were initially deployed to provide dial-up PPP and terminal server access.
应用推荐