对于所负责的资源和操作系统无法识别的用户帐户,程序有时必须强制实施它们自己的访问控制要求。
Programs must sometimes enforce their own access control requirements on resources they are responsible for and on user accounts not recognized by the operating system.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
可以使用这个模型来克服一些技术的内在弱点,并通过在最佳资源间动态地操作来进行控制。
You can use this model to overcome inherent weaknesses of some technologies and controls by maneuvering dynamically between the best of the resources.
应用推荐