限制可以视为是基于角色的访问控制(RBAC)的主要动机。
Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).
本论文研究基于角色的访问控制技术及其在法院系统中的应用。
The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.
介绍了基于角色的访问控制模型和基于任务的访问控制模型的原理。
This paper introduces the theory of access control model based on role and task, and analyzes task and the shortage of above models.
基于角色的访问控制RBAC是一种方便、安全、高效的访问控制机制。
Role Based Access Control(RBAC)is a kind of access control mechanism which is convenient, secure and of high performance.
基于角色的访问控制(RBAC)作为一种安全机制,是当前研究的热点之一。
As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.
完善的安全体系,采用灵活的基于角色的访问控制模型,实现灵活的访问控制体系。
Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.
引入含有时间约束的TRBAC控制模型,结合实践构筑了系统的基于角色的访问控制。
Draw TRBAC who haves time constraint control pattern, and uniting the practice put up the system access control based on characters.
借鉴基于角色的访问控制基本思想,结合开发实践,提出了一种用VJ实现用户权限管理的方法。
Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.
然后,描述了几种具有代表性的基于角色的访问控制模型,并对这几种访问控制模型进行了分析比较。
Then, the paper describes several typical Role Based Access Control models, at the same time analyzes and compares them.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
访问控制技术是网络安全的一项基本技术,主要包括基于角色的访问控制和基于任务的访问控制等技术。
Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.
AIX提供了一种功能,可通过基于角色的访问控制(RBAC)机制将管理角色委托给非root用户。
AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
介绍了自主访问控制、强制访问控制和基于角色的访问控制三种主流的访问控制策略,并进行了对比分析。
This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.
针对基于角色的访问控制(RBAC)模型中由于继承关系产生的子角色不能拥有私有权限问题进行了研究。
A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.
在AIX 6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
基于角色的访问控制模型(RBAC)难以直接有效地应用到以“最小需要”为原则的细粒度访问控制应用领域。
The basic model of RBAC can not be applied directly to the systems which require "minimum necessary" and fine-grained access control.
从实验室教学管理系统的特点出发,讨论了基于角色的访问控制模型RBAC在实验室教学管理系统中应用的优势。
Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.
该模型采用基于角色的访问控制策略,实现了各业务系统间的一次登录、统一认证、统一权限管理和业务漫游功能。
And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.
基于角色的访问控制(RBAC)中,根据组织中不同的工作岗位创建角色,用户的责任与能力,用户被分配到不同的角色。
The roles based on access control are created for the various job functions in an organization and users are assigned roles on their responsibilities and qualifications.
对于不需要基于角色的访问控制,并且只实现一个加密密钥的简单应用程序,那么可以将一个用户出口用于所有加密和解密函数。
For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.
基于角色的访问控制是一种强制形式的访问控制,在操作系统层次上和数据库中已经存在了大量的应用,并且取得了很好的效果。
Role Based access control is an compulsive access control. There are lots of its application in operation system level and database, being of much effect in these aspects.
近几年产生的基于数字证书的认证和基于角色的访问控制具有安全性高、管理灵活的特征,对于加强系统的安全性很有应用前景。
Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
论文在对自主访问控制、强制访问控制和基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择并实现了基于角色的权限管理系统。
This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.
在对文档进行分类的基础上,定义了一种双角色的基于角色的访问控制模型,并给出了此模型的数据流图及部分以XACML形式表示的控制策略。
Based on the classifying of the protected documents, a DR-RBAC model is defined, and its data-flow diagram and two examples of PolicySets expressed by XACML are given out.
系统分析了DCE的总体框架和安全机制,研究了基于博士学位论文摘要角色的访问控制机制的设计,提出了在DCE环境中实现基于角色的访问控制方法。
Following the systematical analysis of the whole framework and the mechanism of DCE, the method of role-based access control is designed within the DCE environment.
系统分析了DCE的总体框架和安全机制,研究了基于博士学位论文摘要角色的访问控制机制的设计,提出了在DCE环境中实现基于角色的访问控制方法。
Following the systematical analysis of the whole framework and the mechanism of DCE, the method of role-based access control is designed within the DCE environment.
应用推荐