系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
完善的安全体系,采用灵活的基于角色的访问控制模型,实现灵活的访问控制体系。
Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.
采用一种新型基于角色的强制访问控制,防攻击和防病毒功能的代理机制。
The firewall is to adopt a new role-based mandatory access control, anti-attack and anti-virus proxy mechanism.
该模型采用基于角色的访问控制策略,实现了各业务系统间的一次登录、统一认证、统一权限管理和业务漫游功能。
And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.
系统采用了基于角色的访问控制策略,进一步保证了系统的安全。
The system adopts the Role Based Access Control to ensure the security of the system.
系统采用了基于角色的访问控制策略,进一步保证了系统的安全。
The system adopts the Role Based Access Control to ensure the security of the system.
应用推荐