• Based on RBAC model, this paper introduces negative authorization into the user assignment and permission assignment, and discusses their realizing approaches and features.

    本文RBAC模型基础上,分别用户分配权限分配中引入了授权讨论了负授权的实现方式及其特点

    youdao

  • An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.

    身份认证访问控制入手,结合PKIRBAC技术提出种针对电子病历的基于身份授权模型

    youdao

  • This paper analyzed the problems existing in administration of authorization in MIS and applied the RBAC in MIS, then presented a logic model of implementation.

    文中分析了目前MIS实施权限管理存在问题RBAC应用于管理信息系统中,给出了实现逻辑模型

    youdao

  • Its fits the dynamic employee and organization structure. The model extends the traditional RBAC by incorporating thin granular permissions control and enough Constrains in authorization.

    符合目前多变企业人员结构组织结构,结合粒度权限划分和充分的授权约束,进一步对传统RBAC做出了扩展,满足动态访问控制的要求。

    youdao

  • Its fits the dynamic employee and organization structure. The model extends the traditional RBAC by incorporating thin granular permissions control and enough Constrains in authorization.

    符合目前多变企业人员结构组织结构,结合粒度权限划分和充分的授权约束,进一步对传统RBAC做出了扩展,满足动态访问控制的要求。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定