• 由于合作伙伴组织员工角色合作伙伴组织控制因此最好采用联合安全模型

    Because the employees and roles of the partner organizations are controlled by the partner organization, it's best to keep the federated security model.

    youdao

  • 随着时间推移,很多框架代替控制角色模型-视图分离也变得微不足道

    Over time, many frameworks took the role of the controller, and model-view separation became trivial.

    youdao

  • 企业经理传统角色基于一种命令控制模型

    The traditional role of the manager in the corporate world is based on a model known as "command and control".

    youdao

  • SpringMVC分离控制模型对象分派以及处理程序对象角色这种分离它们容易进行定制

    Spring MVC separates the roles of the controller, the model object, the dispatcher, and the handler object, which makes them easier to customize.

    youdao

  • 模型-视图-控制(Model - View - Control,MVC)软件设计基础架构用于组件之间的可扩展性模块化角色分离

    The Model-View-Control (MVC) software design architecture is used for its extensibility and modularity in role separation between components. Each component in the MVC is mapped as follows.

    youdao

  • 通过控制进行教学游戏Babbel概念角色模型-这些简单应用使用起来有趣并且获得了大众的喜爱。

    Learning games on consoles became a kind of role model for the Babbel conceptthese simple applications are fun to use and also vastly popular.

    youdao

  • 传统RBAC模型没有给出控制角色指派方法不能保证角色许可最少优先原则

    But the traditional RBAC model doesnot give the method to control the role assignment and it cannot assure the least priority of the role's permission.

    youdao

  • 系统采用了信任机制、基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    youdao

  • 传统RBAC模型没有给出控制角色指派方法,不能保证角色许可最少优先原则

    But the traditional RBAC mode does not give the method to control the role assignment and it cannot assure the least priority of the role 's permission.

    youdao

  • 实验室教学管理系统特点出发,讨论基于角色访问控制模型RBAC实验室教学管理系统中应用的优势

    Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.

    youdao

  • RBAC模型基础上提出一种基于岗位角色的两级访问控制模型——PRBAC

    On the basis of RBAC model, this paper put forward a new model PRBAC, which was a twolevel model based on the post and role.

    youdao

  • 文章提出了一个具有主动适应机制,适用基于角色的权限控制模型系统通用权限组件

    Therefore, this article proposes a role-based universally privilege controlled component which has the mechanism can actively adapt to different systems.

    youdao

  • 传统RBAC模型这种环境下进行访问控制需要为每个同构部分定义权限角色

    Using tradition RBAC to model the access control requirement under such environments will lead to define permissions and roles in each one of these sub-structures.

    youdao

  • 引入了外部角色内部角色基本角色,使得模型可以同时实现自主访问控制强制访问控制,而且也方便管理

    Introduced the outer role, inner role and basic role, the model can not only realize Discretionary Access Control but also the Mandatory Access Control. In addition, it can facilitate the management.

    youdao

  • 安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    youdao

  • 而基于角色访问控制模型角色为中介,将用户权限逻辑隔离模型不能处理执行顺序的任务;

    Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.

    youdao

  • 论文提出一种新的访问控制模型基于资源抽象角色访问控制模型(RD_RBAC)。

    A new model, role access control model based on resource abstract (RD_RBAC), is proposed in the paper.

    youdao

  • 针对基于角色访问控制(RBAC)模型由于继承关系产生角色不能拥有私有权限问题进行了研究。

    A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.

    youdao

  • 组织机构模型设计采用角色任务访问控制达到了对表单数据的访问控制粒度,满足了工作流管理系统中的访问控制目标

    In the design of organization, the paper gives the access control based on roles and tasks to meet the objective of the workflow management, implementing the access control to the data in the form.

    youdao

  • 研究了相关的技术基础SNMP协议HTTP协议代理服务技术以及基于角色访问控制模型

    Some techniques such as SNMP, HTTP, proxy's basic theory and role-based access control are introduced.

    youdao

  • 文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    youdao

  • 角色安全访问控制模型基础提出了基于角色控制的安全工作流模型使文档在工作流引擎的驱动下,在网络环境中流向正确用户

    And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.

    youdao

  • 完善的安全体系采用灵活的基于角色访问控制模型实现灵活的访问控制体系。

    Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.

    youdao

  • 介绍基于角色访问控制模型基于任务的访问控制模型原理

    This paper introduces the theory of access control model based on role and task, and analyzes task and the shortage of above models.

    youdao

  • 该文介绍了RBAC代理机制相结合所带来授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型

    This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.

    youdao

  • 文档进行分类基础上,定义了一种双角色的基于角色的访问控制模型给出了此模型数据流部分XACML形式表示控制策略。

    Based on the classifying of the protected documents, a DR-RBAC model is defined, and its data-flow diagram and two examples of PolicySets expressed by XACML are given out.

    youdao

  • 提出种基于认证可信度角色访问控制模型(AT - RBAC)。

    A new model, role access control model based on authentication trustworthiness (AT-RBAC) is proposed in the paper.

    youdao

  • 详细介绍并讨论基于角色控制数据库模型API模型实现方法

    Detailed discussion is given regarding the implementation of models of RBAC database and API.

    youdao

  • 然后描述了几种具有代表性基于角色访问控制模型几种访问控制模型进行了分析比较

    Then, the paper describes several typical Role Based Access Control models, at the same time analyzes and compares them.

    youdao

  • 然后描述了几种具有代表性基于角色访问控制模型几种访问控制模型进行了分析比较

    Then, the paper describes several typical Role Based Access Control models, at the same time analyzes and compares them.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定