• Then, the paper describes several typical Role Based Access Control models, at the same time analyzes and compares them.

    然后描述了几种具有代表性基于角色访问控制模型几种访问控制模型进行了分析比较

    youdao

  • Role Based Access Control(RBAC)is a kind of access control mechanism which is convenient, secure and of high performance.

    基于角色访问控制RBAC方便安全高效的访问控制机制

    youdao

  • Then, different effect of CPD environment to the role based access control is studied to increase the workflow adaptation.

    在组织控制中,主要研究了协同产品开发环境基于角色存取控制技术影响

    youdao

  • The domain's support provides this key feature to augment the functionality provided by the Role Based Access Control (RBAC).

    支持提供这个关键特性以此补充Role Based Access Control (RBAC)提供功能

    youdao

  • As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.

    基于角色访问控制(RBAC)作为安全机制当前研究热点之一

    youdao

  • In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.

    AIX 6.1中,IBM引入了基于角色访问控制(RBAC),解决了sudo许多安全和审计问题

    youdao

  • Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.

    访问控制技术网络安全一项基本技术,主要包括基于角色访问控制基于任务的访问控制等技术。

    youdao

  • Role Based access control is an compulsive access control. There are lots of its application in operation system level and database, being of much effect in these aspects.

    基于角色访问控制一种强制形式的访问控制,操作系统层次上数据库中已经存在大量应用,并且取得了好的效果。

    youdao

  • The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.

    可采用点登陆、PKI认证授权基于角色权限分配策略、利用应用网关访问资源,开发适合本系统工作流访问机制等措施确保信息平台安全

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.

    认为软件架构师重要事情小心思考应用程序业务角色,将它们紧紧地映射一个基于角色访问控制系统

    youdao

  • This enables role-based views and access control, and this is tied to many of Registry and Repository governance capabilities.

    这会启用基于角色视图访问控制后者许多Registry and Repository 治理功能绑定在一起。

    youdao

  • You learned how WebSphere service Registry and Repository provides role-based access control and how it can be used to manage services and service-related entities such as contracts.

    已经了解WebSphereServiceRegistry andRepository如何提供基于角色访问控制以及如何使用管理服务以及与服务相关的实体(契约)。

    youdao

  • AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.

    AIX提供了一种功能,可通过基于角色访问控制(RBAC)机制管理角色委托给非root用户

    youdao

  • Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    youdao

  • Enterprise encyclopedias are databases that have role-based access control and instance-level access control.

    企业百科全书拥有基于角色控制以及实例层次控制的数据库

    youdao

  • For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.

    对于需要基于角色访问控制并且实现加密密钥简单应用程序那么可以一个用户出口用于所有加密解密函数

    youdao

  • By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.

    设置细颗粒度授权角色访问控制惠普保护系统减少了配置时间客户所需技能水平要求。

    youdao

  • Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.

    在有这个命令之前需要使用Role- Based Access Control (RBAC)帮助纠正setuidsetgid程序问题

    youdao

  • In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    youdao

  • Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.

    实验室教学管理系统特点出发,讨论基于角色访问控制模型RBAC实验室教学管理系统中应用优势

    youdao

  • This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.

    介绍自主访问控制强制访问控制基于角色的访问控制三种主流的访问控制策略进行了对比分析。

    youdao

  • In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    系统采用了信任机制、基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    youdao

  • This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.

    论文对自主访问控制强制访问控制基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择实现了基于角色的权限管理系统

    youdao

  • Some techniques such as SNMP, HTTP, proxy's basic theory and role-based access control are introduced.

    研究了相关的技术基础SNMP协议HTTP协议代理服务技术以及基于角色访问的控制模型;

    youdao

  • The realization theory and access mechanism of the method in passive role-based access control are elaborated by an information system development example.

    文中结合信息系统开发实例,详细介绍了方法被动式基于角色访问控制中的实现原理及其使用方法

    youdao

  • This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.

    该文介绍了RBAC代理机制相结合所带来授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型。

    youdao

  • Following the systematical analysis of the whole framework and the mechanism of DCE, the method of role-based access control is designed within the DCE environment.

    系统分析DCE总体框架安全机制,研究基于博士学位论文摘要角色访问控制机制的设计,提出了DCE环境中实现基于角色访问控制方法

    youdao

  • Synthesizes main models of role - based aceros control and designs a time role - based access control model which is called TRBAC model.

    基于角色访问控制几种主要模型的基础上,提出了一种基于时间角色访问控制模型

    youdao

  • Synthesizes main models of role - based aceros control and designs a time role - based access control model which is called TRBAC model.

    基于角色访问控制几种主要模型的基础上,提出了一种基于时间角色访问控制模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定