The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.
提取的元数据包括一些数据模型对象,例如项目类和它们的属性,还有一些管理对象,例如用户定义和访问控制列表。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
An important reason is that the classic access control model regards the process as an agent of user and grants it all the user's rights, which results in abusing of the authorized user's rights.
一个主要的原因是传统访问控制模型将进程作为用户的代理赋予其用户的全部权限,从而导致用户权力被滥用。
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
This model extends the traditional RBAC model with user credentials, temporal constraints and XML document classification to enforce a content-based time-aware multi-granularity access control.
该模型从用户证书、时间约束、XML文档分类等方面对传统的RBAC模型进行了扩展,以实现基于内容的时间上下文敏感的多粒度访问控制。
The role could span all web systems in portal. It was a token-based and dynamic-activated access control model, which could dynamically adjust the access rights according to user access requirement.
该模型是一个动态激活的模型,根据用户实际的访问需求动态激活相应角色,为用户管理和访问控制管理提供了一个新的解决方案。
This security mechanism can effectively improve the ability of access control model to detect and control a pseudo-user.
该安全机制能有效提高访问控制模型对冒充用户访问的检测及控制能力。
This security mechanism can effectively improve the ability of access control model to detect and control a pseudo-user.
该安全机制能有效提高访问控制模型对冒充用户访问的检测及控制能力。
应用推荐