实现访问控制策略通常包含两个步骤。
Implementing an access control policy usually consists of two steps.
配置简单的访问控制策略可分为两个步骤。
You can divide configuring a simple access control policy into two steps.
编写访问控制策略。
本节将向您展示如何配置IF来实现访问控制策略。
This section shows you how to configure IF to implement an access control policy.
拦截器使用应用程序的访问控制策略来做出授权决定。
Interceptors use your application's access control policy to make authorization decisions.
本发明公开了一种访问控制策略生成方法及装置。
The invention discloses method and device for generating an access controlling policy.
访问控制策略即保证数据库的访问者其身份的合法性。
Access control security strategy is to preserve the legality of the database users.
系统采用了基于角色的访问控制策略,进一步保证了系统的安全。
The system adopts the Role Based Access Control to ensure the security of the system.
XACML是一个灵活的标准,并且允许策略创建者构建复杂的访问控制策略。
XACML is a flexible standard and allows policy authors to build complex access control policies.
在线策略包含一个或多个加密密匙以及访问控制规则。
An online policy holds one or more encryption keys and rules for access control.
本文提出了一种基于RBAC策略的多域网络访问控制模型。
In this paper, we propose a multi-domain RBAC access control model.
本文提出了一种基于RBAC策略的多域网络访问控制模型。
In this paper, we propose a multi-domain RBAC access control model.
应用推荐