模型依赖于一个消息安全处理模型和一个访问控制模型。
The implement of the model depends on a message processing security model and an access control model.
提出了一种面向门户系统的访问控制模型P -RBAC。
This paper proposes an improved access control model for portal systems: P-RBAC.
提供一种高效的访问控制模型是保证P 2 P系统高效、稳定的关键。
An effective access control model is the key of a P2P system's great efficiency and stabilization.
提出一种基于认证可信度的角色访问控制模型(AT - RBAC)。
A new model, role access control model based on authentication trustworthiness (AT-RBAC) is proposed in the paper.
针对P 2 P网络应用环境特点,提出了一种分布式安全访问控制模型。
We design a distributed access control model according to the character of the P2P networks.
多级安全数据库的安全策略需要各种模型来表达,访问控制模型是其中之一。
Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.
为了实现对本体的有效保护,提出了一种基于网络本体语言的访问控制模型。
To guarantee the effective protection of the ontology, a new web ontology language-based (OWL-based) model for access control is proposed.
因此,要满足系统权限的动态特性,需要同样具有动态功能的访问控制模型。
Therefore, to satisfy the dynamic characteristics of the system, dynamic model are needed within function of access control.
基于任务的访问控制模型是一种以任务为中心,并采用动态授权的主动安全模型。
Task based Access Control Model is task centered and offers dynamic authorization , so it belongs to the active security model.
这个访问控制模型既能保护企业资源的安全,同时又能实现协作环境内的资源共享。
This AC model can protect the assets and share the resource in collaborative environment.
完善的安全体系,采用灵活的基于角色的访问控制模型,实现灵活的访问控制体系。
Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.
根本原因是,这可以与WebSphereCommerce访问控制模型中的商店联系起来。
The fundamental reason is that this ties the store in with the WebSphere Commerce access control model.
传统的访问控制模型——MAC模型和DAC模型,已远不能满足当代系统安全的需要。
Traditional access control models, including MAC model and DAC model, have no longer been able to meet the security need of contemporary systems.
在RBAC模型的基础上,提出一种基于岗位和角色的两级访问控制模型——PRBAC。
On the basis of RBAC model, this paper put forward a new model PRBAC, which was a twolevel model based on the post and role.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
论文提出一种新的访问控制模型—基于资源抽象的角色访问控制模型(RD_RBAC)。
A new model, role access control model based on resource abstract (RD_RBAC), is proposed in the paper.
分析了目前P 2 P网络常用的访问控制模型acl模型和rbac模型的优点和不足。
ACL model and RBAC model, which are usually used now in P2P, are described and analyzed.
提出了一个数字证书营运中的基于任务的访问控制模型,解决了数字证书营运中的安全问题。
In this paper, we develop a task-based access control model for the service of certificate to solve those secure-problems.
采用对象技术提出了一个通用的访问控制模型,提供应用级的访问控制机制和安全管理方法。
Propose an object-oriented and formal access control model for developers to design security mechanism of systems and for users to perform their duties securely and efficiently.
提出从静态、功能需求、动态观点来分析模型,并利用UML来表示基于角色访问控制模型。
Present the RBAC model with this well-known modeling language UML , and specify the RBAC model with three views: static view, functional view, and dynamic view.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
使用控制模型是最近才提出的新型访问控制模型,它系统全面地定义了现代访问控制模型的框架。
Usage control model is a new access control model proposed nearly, it defines the framework of modern access control mod-el systematically and semantically.
本文在研究r BAC访问控制模型的基础上,设计了一种应用于电力MIS系统的RBAC模型。
A sort of RBAC model for electric power MIS was designed on the basis of studying access control models.
最后给出一个基于组织建模的访问控制模型实现,并结合具体实例表明了该模型的可行性和有效性。
Finally, an instance of the access control model based on organization modeling is given, which is further used to verify the feasibility and effectiveness of the model.
使用控制模型是最近提出的新型访问控制模型,它系统全面地定义了现代访问控制模型的范畴和框架。
Usage control model is a new access control model proposed nearly, it defines the scope and framework of modern access control model systematically and comprehensively.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
针对网络化制造中协同环境的安全问题,分析了现有访问控制模型以及网络化制造协同任务的应用特点。
Current access control models applied in the network-based manufacturing system and application characteristics of collaborative project were analyzed.
针对网络化制造中协同环境的安全问题,分析了现有访问控制模型以及网络化制造协同任务的应用特点。
Current access control models applied in the network-based manufacturing system and application characteristics of collaborative project were analyzed.
应用推荐