Authorization constraint is an important part in role-based access control models.
授权约束是基于角色的访问控制模型中一个非常重要的部分。
This paper describes three grid access control models based on different current model.
文中将讨论三种基于不同方式的网格访问控制模型。
A sort of RBAC model for electric power MIS was designed on the basis of studying access control models.
本文在研究r BAC访问控制模型的基础上,设计了一种应用于电力MIS系统的RBAC模型。
The traditional access control models and trust management models can not satisfy the P2P environment commendably.
传统的分布式访问控制模型以及信任管理模型并不能很好地适应对等网络环境。
Then, the paper describes several typical Role Based Access Control models, at the same time analyzes and compares them.
然后,描述了几种具有代表性的基于角色的访问控制模型,并对这几种访问控制模型进行了分析比较。
Traditional access control models, including MAC model and DAC model, have no longer been able to meet the security need of contemporary systems.
传统的访问控制模型——MAC模型和DAC模型,已远不能满足当代系统安全的需要。
Current access control models applied in the network-based manufacturing system and application characteristics of collaborative project were analyzed.
针对网络化制造中协同环境的安全问题,分析了现有访问控制模型以及网络化制造协同任务的应用特点。
The value of TTC for enhancing survivability is attested by formal proving, application demonstration and comparing with traditional access control models.
通过对模型的形式化证明,模型的应用示例,以及与传统访问控制模型的对比,证实了TTC模型在增强可生存性方面的价值。
Absrtact: access control is one solution of computer security, which have straight and nature features. Role - Based access control has most important influence among all access control models.
摘要:访问控制是众多计算机安全解决方案中的一种,是最直观最自然的一种方案。
Thus, management retains control over who can access each specific set of models, which prevents potential security violations.
因此,管理保留了对访问模型特定集合的控制权,这就阻止了潜在的安全性入侵。
Publishing Server Access Control - This widget is used to grant rights to users to publish and view models in Publishing Server, as shown in Figure 3.
PublishingServerAccess Control——此小部件用于向用户授予在Publishing Server中发布和查看模型的权限,如图3所示。
Control access and visibility to business service models and policies within the business Services Repository.
控制对BusinessServicesRepository中的业务服务模型和策略的访问和可视性。
Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.
多级安全数据库的安全策略需要各种模型来表达,访问控制模型是其中之一。
Unmetered access providers would then have more control over their costs, enabling them to nail down more accurate business models.
那样,非计时收费接入服务供应商将可以更好地控制运营成本,进而选定更为精的业务模式。
Especially in-depth study the communication mechanism between services, the access control service and traffic statistics service, given the corresponding design models and test results.
并特别针对服务之间的通信机制、流量统计与访问控制服务做了深入研究,给出了相应的设计模型和测试结果。
Synthesizes main models of role - based aceros control and designs a time role - based access control model which is called TRBAC model.
在基于角色访问控制的几种主要模型的基础上,提出了一种基于时间的角色访问控制模型。
This paper introduces the theory of access control model based on role and task, and analyzes task and the shortage of above models.
介绍了基于角色的访问控制模型和基于任务的访问控制模型的原理。
This paper introduces the theory of access control model based on role and task, and analyzes task and the shortage of above models.
介绍了基于角色的访问控制模型和基于任务的访问控制模型的原理。
应用推荐