• Policies are grouped into policy groups based on business and access control requirements.

    可以根据业务访问控制要求策略归入策略组中

    youdao

  • How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.

    基于此,研究了如何维持策略空间穿越中的安全信息完整性有效性,提出了基于安全信息的动态访问控制算法

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • Finally, discrete access control based on protection bits can't provide global secure policy based on individual user.

    基于保护的自主型访问控制,很难实现基于单个用户制定全局安全策略

    youdao

  • It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.

    访问决策子系统负责解析用户属性证书提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制

    youdao

  • It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.

    访问决策子系统负责解析用户属性证书提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定