• 限制可以视为基于角色的访问控制(RBAC)主要动机

    Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).

    youdao

  • 论文研究基于角色访问控制技术及其法院系统中的应用

    The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.

    youdao

  • 介绍基于角色访问控制模型基于任务访问控制模型的原理

    This paper introduces the theory of access control model based on role and task, and analyzes task and the shortage of above models.

    youdao

  • 基于角色访问控制RBAC方便安全高效访问控制机制

    Role Based Access Control(RBAC)is a kind of access control mechanism which is convenient, secure and of high performance.

    youdao

  • 基于角色访问控制(RBAC)作为安全机制当前研究热点之一

    As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.

    youdao

  • 完善的安全体系采用灵活基于角色访问控制模型实现灵活的访问控制体系。

    Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.

    youdao

  • 引入含有时间约束的TRBAC控制模型结合实践构筑系统基于角色访问控制

    Draw TRBAC who haves time constraint control pattern, and uniting the practice put up the system access control based on characters.

    youdao

  • 借鉴基于角色访问控制基本思想,结合开发实践,提出一种VJ实现用户权限管理方法

    Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.

    youdao

  • 然后描述了几种具有代表性基于角色访问控制模型几种访问控制模型进行了分析比较

    Then, the paper describes several typical Role Based Access Control models, at the same time analyzes and compares them.

    youdao

  • 安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    youdao

  • 访问控制技术网络安全一项基本技术,主要包括基于角色访问控制基于任务的访问控制等技术。

    Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.

    youdao

  • AIX提供了一种功能,可通过基于角色访问控制(RBAC)机制管理角色委托给非root用户

    AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.

    youdao

  • 基于角色访问控制模型角色为中介,将用户权限逻辑隔离该模型不能处理执行顺序的任务;

    Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.

    youdao

  • 介绍自主访问控制强制访问控制基于角色的访问控制三种主流访问控制策略进行了对比分析。

    This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.

    youdao

  • 针对基于角色访问控制(RBAC)模型由于继承关系产生角色不能拥有私有权限问题进行了研究。

    A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.

    youdao

  • AIX 6.1中,IBM引入了基于角色访问控制(RBAC),解决了sudo许多安全和审计问题

    In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.

    youdao

  • WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    youdao

  • 基于角色访问控制模型(RBAC)难以直接有效地应用以“最小需要”为原则的粒度访问控制应用领域。

    The basic model of RBAC can not be applied directly to the systems which require "minimum necessary" and fine-grained access control.

    youdao

  • 实验室教学管理系统特点出发,讨论基于角色访问控制模型RBAC实验室教学管理系统中应用的优势

    Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.

    youdao

  • 该模型采用基于角色的访问控制策略,实现业务系统一次登录统一认证、统一权限管理业务漫游功能。

    And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.

    youdao

  • 基于角色访问控制(RBAC)中,根据组织不同工作岗位创建角色用户责任能力,用户分配到不同的角色

    The roles based on access control are created for the various job functions in an organization and users are assigned roles on their responsibilities and qualifications.

    youdao

  • 对于需要基于角色访问控制并且实现加密密钥简单应用程序那么可以一个用户出口用于所有加密解密函数

    For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.

    youdao

  • 基于角色访问控制一种强制形式的访问控制操作系统层次上数据库中已经存在大量应用,并且取得了好的效果

    Role Based access control is an compulsive access control. There are lots of its application in operation system level and database, being of much effect in these aspects.

    youdao

  • 近几年产生基于数字证书认证基于角色访问控制具有安全性高、管理灵活特征对于加强系统安全性有应用前景

    Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.

    youdao

  • 认为软件架构师重要事情小心思考应用程序业务角色,将它们紧紧地映射一个基于角色访问控制系统

    In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.

    youdao

  • 系统采用了信任机制基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    youdao

  • 论文对自主访问控制强制访问控制基于角色的访问控制访问控制策略及机制分析、研究基础上,选择实现基于角色的权限管理系统

    This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.

    youdao

  • 文档进行分类基础上,定义了一种双角色的基于角色的访问控制模型给出了此模型的数据流部分XACML形式表示控制策略。

    Based on the classifying of the protected documents, a DR-RBAC model is defined, and its data-flow diagram and two examples of PolicySets expressed by XACML are given out.

    youdao

  • 系统分析DCE总体框架安全机制,研究基于博士学位论文摘要角色访问控制机制的设计,提出了DCE环境中实现基于角色访问控制方法

    Following the systematical analysis of the whole framework and the mechanism of DCE, the method of role-based access control is designed within the DCE environment.

    youdao

  • 系统分析DCE总体框架安全机制,研究基于博士学位论文摘要角色访问控制机制的设计,提出了DCE环境中实现基于角色访问控制方法

    Following the systematical analysis of the whole framework and the mechanism of DCE, the method of role-based access control is designed within the DCE environment.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定