本发明实施例公开了一种核心业务系统访问权限控制方法和设备。
The embodiment of the invention discloses a core business system access right control method and a device thereof.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
The system must provide security and control access to those functions based on permissions.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
两个操作系统都允许将用户分组管理以简化访问控制,以避免为众多用户分别设置权限。
Both systems allow collecting users into groups so that access control can be done more easily without having to touch many users for each change.
让我们来看看利用sudo控制系统访问权限且用户依然能保有效率的一些最佳实践吧。
Let's look at some of the best practices for controlling system access with sudo while still allowing users to be productive.
但是,可以采取步骤——例如为工件实现一个版本控制系统并授予适当的访问权限——从而帮助减少冲突情况。
However, you can take steps — such as implementing a version-control system for artifacts and granting appropriate access rights — to help reduce conflicting situations.
为有效使用管理控制台,用户需要对整个系统有广泛的访问权限。
For effective use of the admin console, a user needs broad access to the entire system.
这种加密方式可以控制应用系统的用户对数据的访问权限,并且真实数据对所有数据库用户都是不可见的,是最安全的一种加密方式。
This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.
即使操作系统自身也没有被屏蔽储存的完全访问权限,所以入侵者即便控制了操作系统信息也是安全的。
Even if the operating system itself are not shielded stored fully access control, so the invaders even operating system information is safe.
然后,就系统的三个难点问题——异常处理、安全权限控制和异构数据库访问进行了深入的研究。
Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.
在建筑管理信息系统中,对基础数据的访问权限控制是一个重要的内容。
It is very important to control the access to base data of the corporation in construct management information system.
自由访问控制(DAC)是大多数操作系统保护机制的核心,DAC的安全性研究关注对象的权限是否被泄漏给未授权主体。
Discretionary access control (DAC) is the kernel of most protection mechanism, and the research on safety of DAC concerns whether rights can be leaked to unauthorized subjects.
使依托于PKI系统的资源的管理者可以根据自身的安全策略实现对资源的访问控制、权限管理、信任管理等。
So that the owner of the resources could implement access control, authority management, trust management using his security policies under the support of PKI.
因此,要满足系统权限的动态特性,需要同样具有动态功能的访问控制模型。
Therefore, to satisfy the dynamic characteristics of the system, dynamic model are needed within function of access control.
系统实现了基于ACL的访问控制,支持部门、用户、群组及用户访问权限的动态配置与管理。
The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.
MMU的功能是控制各种存储系统的工作并将虚地址转换成物理地址,以及控制存储器访问权限。
The functions of the MMU are to control the various memory systems, translate the virtual addresses into physical addresses and control the access permission.
通过对智能卡结构详细的分析,提出针对一卡通系统的文件结构设计方案和文件访问权限控制策略,并对智能卡的安全问题进行了分析,提出了相应的解决思想。
Through the detailed analysis of the smart card architecture and safety, the article advance a valuable resolution for the smart card file architecture designing and file access control setting.
授权可以控制用户对系统里的内容资源、敏感数据的访问操作,只有有权限操作的用户才可能达到目标资源。
Authorization can control the users 'operations about the content resources and sensitive data in the system, and ensure the users who have the permissions can operate the target resources.
论文在对自主访问控制、强制访问控制和基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择并实现了基于角色的权限管理系统。
This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.
该方案对用户的认证是基于用户的权限进行的,定义了良好的资源访问控制模式,非常适合实际系统对内部网络用户有认证要求的场合。
The scheme is based on the user access control and it defines a fine access control mode. It is very suitable for the case that need to authenticate the user of the private network.
该模型采用基于角色的访问控制策略,实现了各业务系统间的一次登录、统一认证、统一权限管理和业务漫游功能。
And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.
用户界面设计是应用软件系统开发的一个重要方面,而权限访问控制(或安全管理)在现代软件系统中同样有着重要的地位。
UI design is one important aspect in the development of the application software systems, and access control (security management) plays a comparably important role in modern software systems.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
本文就该模型在OA系统中的应用,提出了具体的实现方案,利用用户、角色、动态权限列表和动态菜单列表,实现了系统访问权限的灵活管理和动态控制。
The paper brings out a concrete realization program with the model for the application of this model in the OA system. By using lists of users, roles, dynamic privilege and dynamic men…
本文就该模型在OA系统中的应用,提出了具体的实现方案,利用用户、角色、动态权限列表和动态菜单列表,实现了系统访问权限的灵活管理和动态控制。
The paper brings out a concrete realization program with the model for the application of this model in the OA system. By using lists of users, roles, dynamic privilege and dynamic men…
应用推荐