The two shortages of BLP, excessive trusted users authority and none integrity controling are improved in this paper.
对BLP模型可信用户权限过大和无完整性控制两点不足分别进行了改进。
Since its inception, adhere to the "customer first" business philosophy, the production of water sesame seed with pure quality, excellent quality and highly trusted users.
自建厂以来,秉承“用户至上”的经营理念,生产的水洗芝麻仁以品质纯正,质量优良,深得用户信赖。
The main products are brake drums , wheel hubs and brake shoes, etc . The quality is stable and the price is reliable , best-selling domestic and abroad, deeply trusted users.
主要产品有国产、进口汽车、半挂车、全挂车底盘件,制动鼓、轮毂、制动蹄等,产品质量稳定可靠,畅销国内外,深受用户信赖。
Users can then access services on other machines that participate in this trusted network without again being prompted for a user ID and password.
用户然后可以访问参与此受信任网络的其他计算机上的服务,而不会再次提示用户ID和密码。
The application user can now use this trusted connection to perform some initial configuration tasks and prepare the environment for the end users.
应用程序用户现在可以使用该可信连接执行一些初始配置任务并为最终用户准备好环境。
A trusted context is an object that gives users a specific set of privileges and is available when the user connects to the database through a trusted connection.
受信任上下文是一个对象,它为用户提供一组特定的特权,当用户通过一个受信任的连接连接到数据库时,便可以使用它。
There are many protocols for authenticating remote users, such as certificates or security tokens from trusted sources.
存在许多对远程用户进行身份验证的协议,例如来自受信任来源的证书或安全令牌。
A trusted user mapping can only be created by a user who holds the SECADM authority to prevent users from mapping themselves to more privileged users on the remote data sources.
只有具有SECADM权限的用户才能创建可信用户映射,以防止用户将自己映射到远程数据源上具有更多权限的用户。
Only users with connect privileges on the database can re-use a trusted connection.
只有具有数据库CONNECT权限的用户才能重用可信连接。
Obviously, the users cannot be trusted.
显然,不能相信用户。
However, users running 32-bit wrappers in trusted mode in prior releases will need to run them in fenced mode in V9, and this change alone can have considerable performance impact.
然而,在之前版本中以受信任方式运行32位包装器的用户,在v9中现在需要以隔离方式运行它们,这种变化本身就会导致可观的性能影响。
Furthermore, the ability to switch users with minimum connection resources and without authentication, makes trusted context an ideal choice for business applications.
而且,由于可以以很少的连接资源切换用户,而不需要身份验证,受信任上下文是商业应用程序的理想选择。
All valid database users can reuse the trusted connections established by APP_USER without re-authentication.
所有有效的数据库用户都可以重用APP_USER建立的可信连接,无需重新验证。
This model supports single sign on by users to trusted applications which are able to make service requests on their behalf.
此模型支持用户单点登录到受信任应用程序,由后者以用户的身份进行服务请求。
The federated trusted contexts feature provides users improved security, enhanced performance, and ease of administration.
联合可信上下文功能为用户提供了改进的安全性、增强的性能和易管理性。
Once established, all valid users can reuse this trusted connection without re-authentication.
连接建立后,任何有效用户都可以重用该可信连接,无需重新验证。
After the application has established a trusted connection with the DB2 server, the application may switch users associated with the trusted context object in the backend.
在应用程序已经建立与DB 2服务器的连接之后,应用程序可以在后端切换与受信任上下文相关联的用户。
The ability for explicit trusted connection users to acquire additional privileges during the scope of the trusted connection that may not be available to them otherwise.
显式可信连接用户可以在可信连接范围内获得其他情况下无法获得的其他权限。
Wherever and whenever a trusted mainstream website distributes or promotes third-party content, attackers seek to abuse the trust relationship established between the site and their users.
攻击者随时随地瞄准主流网站。当主流网站发布或推广第三方内容时,攻击者就寻机利用用户对这些主流网站的信任发动攻击。
Trusted certificate authorities issue digital certificates, which are then used to authenticate users and organizations for access to Web sites, E-mail servers, and other secure systems.
可信的证书权威机构发布数字证书,它们被用来鉴别用户和组织访问Web站点,e - mail服务器和其他安全系统的权限。
After the initial setup is complete, application users can begin using the federated trusted contexts.
完成初始设置后,应用程序用户就可以使用联合可信上下文了。
To prevent potential vulnerabilities, do not use the sec_master or users for the trusted user account.
为防止潜在的攻击,不要使用sec_master或者用户作为信任用户帐号。
Attempt to switch users on a federated trusted connection fails.
尝试切换联合可信连接上的用户失败。
But although these DB2 releases became generally available more than three years ago, many users still seem confused regarding the purpose and advantages of roles and trusted contexts.
但是,尽管这些DB2版本比3年前应用更加广泛,但许多用户仍然没弄明白角色和可信上下文的用途和优点。
IBM Tivoli Federated Identity Manager (ITFIM) supports the centralized management of identities and provides users with simplified access to information and services in a trusted fashion.
IBMTivoliFederatedIdentityManager (ITFIM)支持标识的集中管理,为用户提供一种以可信的方式访问信息和服务的简便方法。
For instance, Mallory writes a script that sends users to a trusted Web site created by Alice.
例如,Mallory编写了一个脚本,会将用户发送到Alice创建的一个受信任的Web站点。
So, users will have to install Informix 11.70 on any machine which has remote trusted access to the Cluster machines.
因此,在对集群机器拥有远程信任访问权的机器上,必须安装Informix 11.70。
So, users will have to install Informix 11.70 installation on any machine which has remote trusted access to the Cluster machines.
因此,在对集群机器拥有远程信任访问权的机器上,必须安装Informix 11.70。
You can assume all the direct users are trusted (a naive assumption even for an internal application, but sufficient for this scenario).
您可以假设所有直接访问的用户都是受信任的(即使对内部应用程序来说,这也是一个天真的假设,但是在本场景中这样假设已经足够了)。
By providing users with more secure means to share their data, they can benefit from a much more streamlined, personalized and socially relevant experience when they log in to trusted websites.
通过为用户提供安全分享数据的手段,用户可以从一个更加合理,更加个性化,更加社交化的网站登录体验中收益。
应用推荐