Draw TRBAC who haves time constraint control pattern, and uniting the practice put up the system access control based on characters.
引入含有时间约束的TRBAC控制模型,结合实践构筑了系统的基于角色的访问控制。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
Control layer: responsible for system access control, coordination relationship between the model and the view is the core of the system control unit.
控制层:主要负责系统的访问控制、协调模型和视图间的关系,是系统的核心控制单元。
The primary value of this approach is to control file system access by applications.
这种方法的主要价值在于控制应用程序对文件系统的访问。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
Programs must sometimes enforce their own access control requirements on resources they are responsible for and on user accounts not recognized by the operating system.
对于所负责的资源和操作系统无法识别的用户帐户,程序有时必须强制实施它们自己的访问控制要求。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
For example, one system might not distinguish between read and write operations from the access control perspective, while others might.
例如,一个系统可能无法从访问控制的角度区分读写操作,而另一些系统则可以对此进行区分。
This allows you to establish fine-grained access control for file system objects and support inheritance features.
这样使得您可以为文件系统对象建立细粒度的访问控制,并且支持继承特性。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
Despite the earlier discussion about not having users on the system, many LAMP applications use this functionality to control access and for URL rewriting, so it's wise to understand how it works.
尽管之前探讨过系统没有用户的问题,但许多LAMP应用程序都利用这种功能性来控制访问、实现url重写,因此有必要理解其工作原理。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
An online policy is used for encrypting data written to a file system and protecting data with access control.
在线策略,用于加密写到文件系统的数据,以及通过访问控制保护数据。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
Having a centralized system to provide real-time access and results help the team to measure and control processes.
让集中的系统提供实时的访问和结果来帮助团队测量及控制过程。
The system should provide mechanisms to authenticate users with user data residing in the on-premise environment, and authorize with access control data residing in an on-demand environment.
系统应该提供相应的机制,以便使用自行管理环境中的用户数据对用户进行身份验证,并使用按需环境中的访问控制数据进行授权。
There are some system properties that you can set to control the level of access and the way in which VM data is transmitted from the JMX agent to the management client.
可以设置一些系统属性,来控制访问级别和虚拟机数据从JMX代理向管理客户机传递虚拟机数据的方式。
You are probably familiar with access control functionality provided by an operating system.
您也许熟悉操作系统提供的访问控制功能。
New access-control methods will also be introduced as research into operating system security continues.
随着对操作系统安全性的深入研究,将会引入新的访问控制方法。
The root user can control every process, access every file, and perform any function on the system.
root用户可以控制所有的程序,访问所有文件,使用系统上的所有功能。
When being audited, you will have to prove to the auditor access control between normal and application, system accounts, and how the sugroup policy is being monitored.
在接受审计时,您必须向审计人员证明对普通、应用程序和系统账户的访问控制是有效的,还要展示监视sugroup策略的方法。
Among other things, it specifies the underlying backing store, the access control mechanism, the available workspaces, the versioning system, and the search subsystem. Listing 1 gives an example.
这些任务包括:指定底层的后端存储、访问控制机制、可用的工作区、版本管理系统和搜索子系统。
Subversion (SVN) is an open source version control system that facilitates storage, access, and parallel development of source, scripts, binaries, and other file types.
Subversion (SVN)是一种开源的版本控制系统,它为源文件、脚本、二进制文件和其它文件类型的存储、访问和并行开发提供便利。
Wrappers allow system administrators to control access of TCP-based services or daemons that are wrappers aware.
Wrappers允许系统管理员控制 wrappers 支持的基于TCP 的服务或守护进程的访问。
Using sugroups enables system administrators to control access to individual user accounts by group membership.
使用sugroup 让系统管理员能够通过组成员关系控制对各个用户账户的访问。
Security is also an issue; SimpleDB's access control system is similar to S3's.
安全性也是一个问题;SimpleDB 的访问控制系统类似S3。
应用推荐