• 发明实施公开了一种核心业务系统访问权限控制方法设备

    The embodiment of the invention discloses a core business system access right control method and a device thereof.

    youdao

  • 如果谨慎地控制文件系统访问权限用户只需手工编辑配置文件,就可以破坏产品安全性控制(比如审计)。

    If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.

    youdao

  • 系统必须提供安全性根据相应的权限控制这些功能访问

    The system must provide security and control access to those functions based on permissions.

    youdao

  • 与表一样昵称也有对等的一权限用于控制用户联邦系统昵称对象访问

    Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.

    youdao

  • 个操作系统允许用户分组管理简化访问控制,以避免众多用户分别设置权限

    Both systems allow collecting users into groups so that access control can be done more easily without having to touch many users for each change.

    youdao

  • 我们来看看利用sudo控制系统访问权限用户依然能保有效率一些最佳实践吧。

    Let's look at some of the best practices for controlling system access with sudo while still allowing users to be productive.

    youdao

  • 但是可以采取步骤——例如工件实现一个版本控制系统授予适当访问权限——从而帮助减少冲突情况

    However, you can take stepssuch as implementing a version-control system for artifacts and granting appropriate access rightsto help reduce conflicting situations.

    youdao

  • 有效使用管理控制用户需要整个系统有广泛访问权限

    For effective use of the admin console, a user needs broad access to the entire system.

    youdao

  • 这种加密方式可以控制应用系统用户数据访问权限并且真实数据所有数据库用户可见的,安全的一加密方式。

    This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.

    youdao

  • 即使操作系统自身没有被屏蔽储存完全访问权限所以入侵者即便控制了操作系统信息也是安全的。

    Even if the operating system itself are not shielded stored fully access control, so the invaders even operating system information is safe.

    youdao

  • 然后系统三个难点问题——异常处理安全权限控制异构数据库访问进行了深入的研究。

    Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.

    youdao

  • 建筑管理信息系统中,基础数据访问权限控制一个重要的内容。

    It is very important to control the access to base data of the corporation in construct management information system.

    youdao

  • 自由访问控制(DAC)大多数操作系统保护机制核心,DAC的安全性研究关注对象的权限是否泄漏未授权主体

    Discretionary access control (DAC) is the kernel of most protection mechanism, and the research on safety of DAC concerns whether rights can be leaked to unauthorized subjects.

    youdao

  • 使依托于PKI系统资源管理者可以根据自身的安全策略实现对资源的访问控制权限管理信任管理等。

    So that the owner of the resources could implement access control, authority management, trust management using his security policies under the support of PKI.

    youdao

  • 因此满足系统权限动态特性需要同样具有动态功能访问控制模型

    Therefore, to satisfy the dynamic characteristics of the system, dynamic model are needed within function of access control.

    youdao

  • 系统实现基于ACL访问控制支持部门用户群组用户访问权限动态配置管理

    The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.

    youdao

  • MMU功能控制各种存储系统工作并地址转换物理地址,以及控制存储器访问权限

    The functions of the MMU are to control the various memory systems, translate the virtual addresses into physical addresses and control the access permission.

    youdao

  • 通过智能卡结构详细分析提出针对一卡通系统文件结构设计方案文件访问权限控制策略,对智能卡的安全问题进行了分析,提出了相应的解决思想。

    Through the detailed analysis of the smart card architecture and safety, the article advance a valuable resolution for the smart card file architecture designing and file access control setting.

    youdao

  • 授权可以控制用户系统内容资源敏感数据访问操作,只有权限操作的用户才可能达到目标资源。

    Authorization can control the users 'operations about the content resources and sensitive data in the system, and ensure the users who have the permissions can operate the target resources.

    youdao

  • 论文对自主访问控制强制访问控制基于角色访问控制访问控制策略及机制分析、研究基础上,选择实现了基于角色的权限管理系统

    This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.

    youdao

  • 方案用户认证基于用户的权限进行的,定义良好的资源访问控制模式非常适合实际系统对内部网络用户有认证要求的场合。

    The scheme is based on the user access control and it defines a fine access control mode. It is very suitable for the case that need to authenticate the user of the private network.

    youdao

  • 该模型采用基于角色的访问控制策略,实现业务系统一次登录统一认证、统一权限管理业务漫游功能。

    And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.

    youdao

  • 用户界面设计应用软件系统开发一个重要方面权限访问控制(或安全管理)现代软件系统中同样有着重要的地位

    UI design is one important aspect in the development of the application software systems, and access control (security management) plays a comparably important role in modern software systems.

    youdao

  • 模型解决了传统基于角色访问控制中的动态适应性差最小权限约束假象问题,用于分布式工作流管理系统提高安全性实用性

    This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.

    youdao

  • 本文模型OA系统中的应用提出具体实现方案利用用户角色动态权限列表动态菜单列表,实现了系统访问权限灵活管理和动态控制

    The paper brings out a concrete realization program with the model for the application of this model in the OA system. By using lists of users, roles, dynamic privilege and dynamic men…

    youdao

  • 本文模型OA系统中的应用提出具体实现方案利用用户角色动态权限列表动态菜单列表,实现了系统访问权限灵活管理和动态控制

    The paper brings out a concrete realization program with the model for the application of this model in the OA system. By using lists of users, roles, dynamic privilege and dynamic men…

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定