XACML (Extensible access control Markup Language) for federated authorization and access control.
联邦授权和访问控制的XACML(可扩展访问控制标记语言)。
Its architecture, promise & assurance mechanism, separation of duties of authorization and access control are discussed.
讨论了模型体系结构,承诺担保机制,授权职责分离以及访问控制。
The system meets the demands of uniform authorization and access control, possessing the merits of good security, high flexible and easy to management.
该系统满足了统一授权和访问控制的需求,具有安全性好、灵活性高、便于管理等特点。
The important content of PMI(Privilege Management Infrastructure) and model is to realize the efficient management of authorization and access control.
PMI体系和模型的核心内容是实现授权与访问控制的有效管理。
Since HIS System covers a wide range of Medical Privacy, it must provide flexible Authorization and Access Control as well as perfect protection mechanism for Medical Privacy.
HIS系统涵盖了诸多医疗隐私信息,因此它既要实现对此类信息的灵活授权与访问控制,又要具备充分的隐私保护机制。
So, there must be a uniform platform to realize the user authorization and access control, to provide the uniform user authorization and access control service for all the other systems.
因此,必须要有一种统一的授权访问控制平台,为各应用系统实现统一授权管理和访问控制。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
A typical access control and authorization scenario includes three main entities — a subject, a resource, and an action — and their attributes.
典型的访问控制和授权场景包括三个主要实体:主体、资源和动作以及它们的属性。
They both share a lot of concepts and a domain — the domain of authentication, authorization, and access control.
它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
Ben also talked about advanced web security requirements like method level authorization, JSR-250 for defining method security metadata, Spring security method metadata, and domain access control.
Ben还谈到了一些高级web安全需求,例如方法层的授权、定义方法安全元数据的JSR- 250规格、SpringSecurity方法元数据以及领域的访问控制等。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
If only the identity of the middle tier service is propagated to the downstream service, the downstream service does not have proper control over audit and authorization of access to the service.
如果只有中间层服务的标识传播到下游服务,则下游服务不能对服务访问审核和授权进行正确的控制。
Remember that the authorization section can be used in web.config files placed in subdirectories, and can also be used in a element to control access to individual files.
记住authorization节点可以在子目录中的web .config文件中使用,也可以在元素中使用来控制访问单独的文件。
Task based access control (TBAC) is an initiative security model, where task is focus of work and dynamic authorization is used.
基于任务的授权控制(TBAC)则是以任务为中心,并采用动态授权的主动安全模型。
At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.
最后使用此策略构造了一个基于属性证书的授权和访问控制模型,能够灵活方便地实现电子政务中的安全访问控制。
Task based Access Control Model is task centered and offers dynamic authorization , so it belongs to the active security model.
基于任务的访问控制模型是一种以任务为中心,并采用动态授权的主动安全模型。
System component includes authorization management system, identification authentication server and access control server.
系统组件由授权管理系统、身份认证服务器和访问控制服务器三大部分组成。
This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.
该文介绍了RBAC与代理机制相结合所带来的授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型。
The ISO10181 access control framework and the Privilege Management Infrastructure PMI are analyzed, and a Cross Trust Regions Authorization Framework(CTRA) is designed.
分析ISO10181访问控制框架与权限管理基础设施PMI,提出了跨信任域的授权模型CTRA。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.
从身份认证和访问控制入手,结合PKI和RBAC技术,提出了一种针对电子病历的基于身份的授权模型。
An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.
从身份认证和访问控制入手,结合PKI和RBAC技术,提出了一种针对电子病历的基于身份的授权模型。
应用推荐