提出一种基于认证可信度的角色访问控制模型(AT - RBAC)。
A new model, role access control model based on authentication trustworthiness (AT-RBAC) is proposed in the paper.
论文提出一种新的访问控制模型—基于资源抽象的角色访问控制模型(RD_RBAC)。
A new model, role access control model based on resource abstract (RD_RBAC), is proposed in the paper.
在基于角色访问控制的几种主要模型的基础上,提出了一种基于时间的角色访问控制模型。
Synthesizes main models of role - based aceros control and designs a time role - based access control model which is called TRBAC model.
该文介绍了RBAC与代理机制相结合所带来的授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型。
This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
仪表板还提供了对于访问控制警报、操作和用户角色的支持。
Also available from the dashboard are support for alerts, operations, and user roles for access control.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
图7:可以将RAM的访问控制配置为,允许同一个用户在多个社区中扮演拥有各不相同的权限和约束的多个角色。
Figure 7: Access control for RAM can be configured to allow the same user to have multiple roles across multiple communities with varying permissions and constraints.
角色决定用户的访问控制。
多数用户执行访问控制是通过使用诸如角色和权限这类概念完成的。
Most users perform access control by employing concepts such as roles and permissions.
类似地,还可以根据角色控制对收费服务的访问,以确保对服务的适当使用。
Similarly, access to fee-based services can also be controlled based on roles to ensure proper use of services.
授权的目的是对每个ID、每个角色、或者每个概要进行访问控制。
The purpose of authorization is to control access to resources on a per-ID, per-role, or per-profile basis.
当PAM模块决定bob必须登录到cashier_r角色中时,将实际发生访问控制的第一部分。
The first bit of access control actually happens at login when a PAM module decides that Bob must log in to role cashier_r.
PQ96873这种逻辑对于大量更新访问控制配置的情况特别有用(尤其是在角色分配和取消分配时);否则,应该为false。
PQ96873 This logic especially makes useful in scenarios with many updates of the access control configuration (especially role assignments and unassignments), otherwise, should be false. false
创建包含角色和访问控制的社区。
图1:一个新的服务创建项目的社区、角色和访问控制。
Figure 1: Sample communities, roles, and access controls for a new service creation project.
在AIX 6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
AIX提供了一种功能,可通过基于角色的访问控制(RBAC)机制将管理角色委托给非root用户。
AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.
基于角色、用于用户治理和访问控制的设施。
用户角色和访问控制都是Domino数据库结构中与生具来的特性。
User roles and access control are inherent in Domino's database structure.
Acegi将减轻代码编写的工作,因此在这篇文章中,我将展示如何将用户和用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略。
Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.
作为对基于标签的访问控制(LBAC)的DB 2 Viper 2数据库角色增强的一部分,可以对一个角色或组授予或收回安全标签或豁免权。
As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.
您已经了解到WebSphereServiceRegistry andRepository如何提供基于角色的访问控制,以及如何使用它来管理服务以及与服务相关的实体(如契约)。
You learned how WebSphere service Registry and Repository provides role-based access control and how it can be used to manage services and service-related entities such as contracts.
然而,有些工具,比如sudo,允许普通用户充当root用户或超级用户的角色,并通过配置文件提供访问控制。
However, there are some tools like sudo, which allows regular users to behave like a root or super user and provides access control through a configuration file.
我们的客户同时利用基于角色的权限和细粒度访问控制。
Our clients take advantage of both role-based permission and fine-grained access control.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
其中的每个应用程序角色都聚合一组非常特定的门户访问控制角色。
Each of these application roles aggregates a set of very specific portal access control roles.
您可以对各个组件隐藏许多访问控制角色的复杂性,并使用易于理解和方便使用的名称将它们公开为少数几个简单的应用程序级别角色。
You can hide the complexity of many access control roles to individual components and expose them as few simplified application level roles with well-understood and easy to use names.
应用推荐