我们的客户同时利用基于角色的权限和细粒度访问控制。
Our clients take advantage of both role-based permission and fine-grained access control.
标准的基于角色访问控制(RBAC)通过角色对用户和权限进行解耦,从受控资源角度来讲是一维的。
The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
借鉴基于角色的访问控制基本思想,结合开发实践,提出了一种用VJ实现用户权限管理的方法。
Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.
在基于角色访问控制的基础上,利用DBMS的审计功能,将用户审计信息与实际的权限管理信息相比较,从而侦测出内部合法用户的滥用行为。
On RBAC, using the audit function of DBMS, by comparing user's audit to the authorization administration information, this System can detect user's misuse behavior to DBMS.
论文在对自主访问控制、强制访问控制和基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择并实现了基于角色的权限管理系统。
This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.
该模型采用基于角色的访问控制策略,实现了各业务系统间的一次登录、统一认证、统一权限管理和业务漫游功能。
And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.
针对基于角色的访问控制(RBAC)模型中由于继承关系产生的子角色不能拥有私有权限问题进行了研究。
A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
应用推荐