Secure access control for services using policies is also provided.
还提供了通过策略实现的服务安全访问控制。
The traditional RBAC model cannot express complicated workflow secure access control constraint.
传统的RBAC访问控制模型已经不能表达复杂的工作流安全访问控制约束。
The current secure access control techniques in IP multicast just implemented the access control to multicast receivers.
目前针对IP组播的安全访问控制问题的解决方案只是实现了对组播接收者的访问控制。
It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.
本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制。
This paper analyzes how to realize secure access control for XML documents using RBAC from aspects of role, role hierarchy, authorization, etc.
文中从角色、角色继承、授权等方面分析了如何利用RBAC实现对XML文档的安全访问控制。
This paper proposed a simple and secure access control mechanism that can effectively control mobile agents updating and creating ability in native host.
本文提出了一个简单安全的存取控制机制,可以有效地控制移动代理在本地主机的更新及创建权限。
With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.
随着信息技术在风力发电中的应用,风电场SCADA系统的安全访问控制变得越来越重要。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
Due to complexity of modeling workflow and problems of secure access control, a method that makes a workflow model by setting up task nodes, route nodes and their dependency is brought forward.
针对工作流建模的复杂性和模型的安全存取控制问题,提出一种通过建立任务节点和路由节点及其依赖关系来创建工作流模型的方法。
It enables you to rectify the problem by providing you with secure access to and control of all servers, routers, switches, and power devices in your remote data centers.
它使您可以安全访问和控制远程数据中心的所有服务器、路由器、交换机和电源设备,让您能够纠正问题。
It may be necessary to secure event payloads from unauthorized access using access control.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (Access ControlList) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
In this case, the Cglib2AopProxy class creates the proxy objects you will need to control access to your secure beans.
在本例中,cglib2aopproxy类将创建安全bean访问控制所需的代理对象。
Audit network access control and secure remote access systems.
审计网络访问控制和安全远程访问系统。
Discretionary Access Control is one of necessary and most common secure mechanisms in the secure operating system.
自主访问控制机制是安全操作系统必不可少的、应用最广泛的安全机制之一。
In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.
在用户层次结构的动态存取控制问题上,本文提出了一种安全有效的方案。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.
采用消息过滤算法可以在支持对象模型的多级安全系统中实现强制访问控制。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
It provided support of secure remote login, the secure file transfer, the access control and the port forwarding.
它提供了对安全远程登录、安全文件传输、访问控制和端口转发的支持。
Injecting RBAC mechanism into task nodes to restrict the role attribute can secure the access control of the workflow.
在任务节点中引入RBAC机制对角色属性进行约束以实现对工作流的安全存取控制。
Aiming at the self-beneficial attack problem in layered multicast protocol, a secure layered multicast protocol is presented. The congestion state related access control algorithm is designed.
针对分层组播协议存在的自利型攻击问题,提出了一种安全分层组播协议,设计了基于拥塞状态的访问控制算法。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
Finally, discrete access control based on protection bits can't provide global secure policy based on individual user.
基于保护位的自主型访问控制,很难实现基于单个用户制定全局安全策略。
Labels are the foundation for implementing multilevel systems and the prerequisite of enforcing mandatory access control in secure systems.
标记是实现多级安全系统的基础,实施强制访问控制的前提。
The model can be used to solve the problem of access control to server and secure communication between browser and server.
可用于解决浏览器服务器访问模式下的服务器方的访问控制以及浏览器和服务器间的安全通信问题。
In this solution, SSL is used to ensure secure transmission. XML data signature and encryption are used to achieve secure dada format and XML access control mechanism is deployed.
在该方案中应用SSL实现安全的数据传输、应用XML数字签名和加密实现安全的数据表示以及应用安全的XML访问控制机制。
Combining security of SSL protocol and find-grained access control, SSL VPN(Secure Socket Layer Virtual Private Netwrok) does well in resolving this problem.
结合SSL的加密特性和细粒度的访问控制,很好地解决了上述问题。
The other technology LDAP can provide a secure model to control access requirement according to identity information.
LDAP提供了一个访问控制的安全模型,根据身份信息对提出的访问请求进行控制。
The other technology LDAP can provide a secure model to control access requirement according to identity information.
LDAP提供了一个访问控制的安全模型,根据身份信息对提出的访问请求进行控制。
应用推荐