A security and access control model that distinguishes between these two classes of users.
区分上述两类用户的安全和访问控制模型。
These support interactions with the Access Control model and with the Classification Systems.
这些界面支持与访问控制模型和分类系统进行交互。
SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.
SCA还为单个服务集合的业务解决方案的组装提供了一个模型,并控制解决方案的各个方面,如访问方法和安全。
For example, POP3's single mailbox model can lead to thousands of large messages in a single location, making access and control of the mailbox a tedious affair.
例如,POP3的单一邮箱模型会导致数千条大型消息都处于一个位置,从而使得对邮箱的访问和控制成了件麻烦事。
In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.
在当前以网络为中心的业务模型中,验证个人身份、控制访问和维护数据的完整性与保密性变得越来越难。
The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.
提取的元数据包括一些数据模型对象,例如项目类和它们的属性,还有一些管理对象,例如用户定义和访问控制列表。
Part 3: Rational Rose model creation and access control; requirements analysis.
第3部分:模型创建和访问控制;需求分析。
The customization mechanism to support tenant-specific UI, access control, process and data model via configuration approaches.
通过配置方法支持与租户相关的UI、访问控制、过程和数据模型。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
Task based access control (TBAC) is an initiative security model, where task is focus of work and dynamic authorization is used.
基于任务的授权控制(TBAC)则是以任务为中心,并采用动态授权的主动安全模型。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
Architecture and mechanism for access control are the realization of access control model in system.
访问控制框架和访问控制机制是访问控制模型在系统中的实现。
Supported by a National 863 project, implementing flexible, security and effective model as objective, research on access control for XML documents is conducted in this paper.
本文在国家863项目的支持下,以实现灵活、安全而且高效的模型为目标,对面向XML文档的访问控制进行了全面的研究。
Firstly introduced the basic conception and model of RBAC96, then according to the real demand of the office automation system, putted forward the access control model.
介绍RBAC96的基本概念和模型,结合办公自动化系统中实际的需求,提出自己的访问控制模式。
The implement of the model depends on a message processing security model and an access control model.
模型依赖于一个消息安全处理模型和一个访问控制模型。
Introduced the outer role, inner role and basic role, the model can not only realize Discretionary Access Control but also the Mandatory Access Control. In addition, it can facilitate the management.
引入了外部角色、内部角色和基本角色,使得该模型可以同时实现自主访问控制和强制访问控制,而且也方便了管理。
RBAC model is the most popular access control strategy because of its flexibleness, convenience and security.
RBAC模型具有灵活性、方便性和安全性的特点,因此成为访问控制策略的首选。
The paper puts forward a delegation logic based access control model (DLBAC). It translates the credentials, RBAC elements and access policies into unified delegation logic rules.
提出了一种基于委托逻辑的访问控制模型——dlbac,将凭证、RBAC元素和访问策略转化为统一的委托逻辑规则。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
In this model, the access rules and the access control attributes are defined. The relations for the access control are set up.
该模型为本体中的类定义了访问规则和访问控制属性,并由此建立了访问控制关系。
Task based Access Control Model is task centered and offers dynamic authorization , so it belongs to the active security model.
基于任务的访问控制模型是一种以任务为中心,并采用动态授权的主动安全模型。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
Then, an access control model based on organization modeling for enterprise information systems is proposed, the elements are defined and the mechanism for realizing control access is advanced.
在此基础上给出一个基于组织建模的企业级信息系统访问控制模型,定义了一组模型要素并给出了实现访问控制的机理。
It provides a definite and extensible sensitive information model processed by access control model. This can improve the pertinence of the study of flexible access control model.
这为访问控制模型需要处理的敏感信息提供了一个明确的模型,从而提高了柔性访问控制模型研究的针对性。
An effective access control model is the key of a P2P system's great efficiency and stabilization.
提供一种高效的访问控制模型是保证P 2 P系统高效、稳定的关键。
Traditional access control models, including MAC model and DAC model, have no longer been able to meet the security need of contemporary systems.
传统的访问控制模型——MAC模型和DAC模型,已远不能满足当代系统安全的需要。
RBAC model provide a flexible and efficiency access control model for CSCW.
RBAC模型为CSCW提供了一种灵活,有效的访问控制模式。
We analyze RBAC concept model, compare it with traditional access control scheme, and demonstrate the necessity of implement RBAC in Enterprise Information Systems.
本文从理论上研究了RBAC的概念模型,并与传统的安全访问控制相比较,论证了在企业信息系统中采用RBAC的必要性。
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
应用推荐