• Role-based access control (RBAC)

    基于角色的访问控制 (RBAC)

    youdao

  • Another approach to controlling access is role-based access control (RBAC).

    另一种控制访问方法基于角色的访问控制(RBAC)。

    youdao

  • Authorization constraint is an important part in role-based access control models.

    授权约束基于角色的访问控制模型一个非常重要部分

    youdao

  • Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).

    限制可以视为基于角色的访问控制(RBAC)主要动机

    youdao

  • Some techniques such as SNMP, HTTP, proxy's basic theory and role-based access control are introduced.

    研究了相关的技术基础SNMP协议HTTP协议代理服务技术以及基于角色访问的控制模型;

    youdao

  • Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    youdao

  • Enterprise encyclopedias are databases that have role-based access control and instance-level access control.

    企业百科全书拥有基于角色控制以及实例层次控制的数据库

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.

    完善的安全体系采用灵活的基于角色访问控制模型实现灵活的访问控制体系。

    youdao

  • AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.

    AIX提供了一种功能,可通过基于角色访问控制(RBAC)机制管理角色委托给非root用户

    youdao

  • Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.

    在有这个命令之前需要使用Role - Based Access Control (RBAC)帮助纠正setuidsetgid程序问题

    youdao

  • The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.

    论文研究基于角色访问控制技术及其法院系统中的应用

    youdao

  • This paper analyzes the characteristics of Spacecraft Fault Diagnosis System and the basic idea and principle of Role-Based Access Control model.

    文章介绍了基于角色权限管理模型基本思想工作原理,并分析航天器故障诊断系统权限管理的特征

    youdao

  • By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.

    设置细颗粒度授权角色访问控制惠普保护系统减少了配置时间客户所需技能水平要求。

    youdao

  • A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.

    针对基于角色访问控制(RBAC)模型由于继承关系产生角色不能拥有私有权限问题进行了研究。

    youdao

  • Second, it USES resource proxy pattern to realize role-based access control of mobile agents. Thus, it can give the sensitivity resource double protection.

    采用资源代理模式实现移动代理基于角色权限特化,敏感资源进行双重保护

    youdao

  • The realization theory and access mechanism of the method in passive role-based access control are elaborated by an information system development example.

    文中结合信息系统开发实例,详细介绍了方法被动式基于角色访问控制中的实现原理及其使用方法

    youdao

  • Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.

    而基于角色访问控制模型角色为中介,将用户权限逻辑隔离该模型不能处理执行顺序的任务;

    youdao

  • Following the systematical analysis of the whole framework and the mechanism of DCE, the method of role-based access control is designed within the DCE environment.

    系统分析DCE总体框架安全机制,研究基于博士学位论文摘要角色访问控制机制的设计,提出了DCE环境中实现基于角色访问控制方法

    youdao

  • This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.

    该文介绍了RBAC代理机制相结合所带来授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型。

    youdao

  • The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.

    标准的基于角色访问控制RBAC通过角色用户权限进行解耦,受控资源角度来讲一维的。

    youdao

  • Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.

    实验室教学管理系统特点出发,讨论基于角色访问控制模型RBAC实验室教学管理系统中应用优势

    youdao

  • This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.

    一方面网络系统实施有效安全管理,做好网络数据备份网络用户的管理项工作。

    youdao

  • This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.

    介绍自主访问控制强制访问控制基于角色的访问控制三种主流的访问控制策略进行了对比分析。

    youdao

  • In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    系统采用了信任机制、基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    youdao

  • Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.

    借鉴基于角色访问控制基本思想,结合开发实践,提出一种VJ实现用户权限管理方法

    youdao

  • You learned how WebSphere service Registry and Repository provides role-based access control and how it can be used to manage services and service-related entities such as contracts.

    已经了解WebSphereServiceRegistry andRepository如何提供基于角色访问控制以及如何使用管理服务以及与服务相关的实体(契约)。

    youdao

  • In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    youdao

  • In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.

    认为软件架构师重要事情小心思考应用程序业务角色,将它们紧紧地映射一个基于角色访问控制系统

    youdao

  • In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.

    认为软件架构师重要事情小心思考应用程序业务角色,将它们紧紧地映射一个基于角色访问控制系统

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定