• Authorization constraint is an important part in role-based access control models.

    授权约束基于角色的访问控制模型一个非常重要部分

    youdao

  • This paper describes three grid access control models based on different current model.

    文中将讨论三种基于不同方式网格访问控制模型

    youdao

  • A sort of RBAC model for electric power MIS was designed on the basis of studying access control models.

    本文在研究r BAC访问控制模型基础,设计种应用电力MIS系统RBAC模型。

    youdao

  • The traditional access control models and trust management models can not satisfy the P2P environment commendably.

    传统的分布式访问控制模型以及信任管理模型并不能很好地适应对等网络环境

    youdao

  • Then, the paper describes several typical Role Based Access Control models, at the same time analyzes and compares them.

    然后描述了几种具有代表性基于角色访问控制模型几种访问控制模型进行了分析比较

    youdao

  • Traditional access control models, including MAC model and DAC model, have no longer been able to meet the security need of contemporary systems.

    传统访问控制模型——MAC模型DAC模型,远不能满足当代系统安全需要

    youdao

  • Current access control models applied in the network-based manufacturing system and application characteristics of collaborative project were analyzed.

    针对网络化制造协同环境安全问题,分析了现有访问控制模型以及网络化制造协同任务的应用特点

    youdao

  • The value of TTC for enhancing survivability is attested by formal proving, application demonstration and comparing with traditional access control models.

    通过对模型形式化证明,模型的应用示例以及传统访问控制模型的对比,证实了TTC模型增强生存性方面的价值

    youdao

  • Absrtact: access control is one solution of computer security, which have straight and nature features. Role - Based access control has most important influence among all access control models.

    摘要访问控制众多计算机安全解决方案中的种,是直观自然的一种方案。

    youdao

  • Thus, management retains control over who can access each specific set of models, which prevents potential security violations.

    因此管理保留了访问模型特定集合控制权就阻止了潜在安全性入侵

    youdao

  • Publishing Server Access Control - This widget is used to grant rights to users to publish and view models in Publishing Server, as shown in Figure 3.

    PublishingServerAccess Control——小部件用于用户授予Publishing Server中发布查看模型权限如图3所示。

    youdao

  • Control access and visibility to business service models and policies within the business Services Repository.

    控制BusinessServicesRepository中的业务服务模型策略访问可视性

    youdao

  • Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.

    多级安全数据库安全策略需要各种模型表达访问控制模型其中之一

    youdao

  • Unmetered access providers would then have more control over their costs, enabling them to nail down more accurate business models.

    那样,非计时收费接入服务供应商可以更好地控制运营成本,进而选定更为业务模式。

    youdao

  • Especially in-depth study the communication mechanism between services, the access control service and traffic statistics service, given the corresponding design models and test results.

    特别针对服务之间通信机制流量统计访问控制服务做了深入研究给出了相应设计模型测试结果

    youdao

  • Synthesizes main models of role - based aceros control and designs a time role - based access control model which is called TRBAC model.

    基于角色访问控制几种主要模型的基础上,提出了一种基于时间角色访问控制模型

    youdao

  • This paper introduces the theory of access control model based on role and task, and analyzes task and the shortage of above models.

    介绍基于角色访问控制模型基于任务访问控制模型的原理

    youdao

  • This paper introduces the theory of access control model based on role and task, and analyzes task and the shortage of above models.

    介绍基于角色访问控制模型基于任务访问控制模型的原理

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定