系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
完善的安全体系,采用灵活的基于角色的访问控制模型,实现灵活的访问控制体系。
Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.
采用一种新型基于角色的强制访问控制,防攻击和防病毒功能的代理机制。
The firewall is to adopt a new role-based mandatory access control, anti-attack and anti-virus proxy mechanism.
应用推荐