Role-based access control (RBAC)
基于角色的访问控制 (RBAC)
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
Authorization constraint is an important part in role-based access control models.
授权约束是基于角色的访问控制模型中一个非常重要的部分。
Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).
限制可以视为是基于角色的访问控制(RBAC)的主要动机。
Some techniques such as SNMP, HTTP, proxy's basic theory and role-based access control are introduced.
研究了相关的技术基础,如SNMP协议,HTTP协议,代理服务技术以及基于角色访问的控制模型;
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
Enterprise encyclopedias are databases that have role-based access control and instance-level access control.
企业百科全书是拥有基于角色控制以及实例层次控制的数据库。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.
完善的安全体系,采用灵活的基于角色的访问控制模型,实现灵活的访问控制体系。
AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.
AIX提供了一种功能,可通过基于角色的访问控制(RBAC)机制将管理角色委托给非root用户。
Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.
在有这个命令之前,您需要使用Role - Based Access Control (RBAC)来帮助纠正setuid和setgid程序的问题。
The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.
本论文研究基于角色的访问控制技术及其在法院系统中的应用。
This paper analyzes the characteristics of Spacecraft Fault Diagnosis System and the basic idea and principle of Role-Based Access Control model.
文章介绍了基于角色的权限管理模型的基本思想及工作原理,并分析了航天器故障诊断系统中权限管理的特征。
By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.
设置细颗粒度的授权和角色访问控制,惠普保护系统减少了配置时间和客户所需的技能水平要求。
A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.
针对基于角色的访问控制(RBAC)模型中由于继承关系产生的子角色不能拥有私有权限问题进行了研究。
Second, it USES resource proxy pattern to realize role-based access control of mobile agents. Thus, it can give the sensitivity resource double protection.
二是采用资源代理模式实现移动代理基于角色的权限特化,对敏感资源进行双重保护。
The realization theory and access mechanism of the method in passive role-based access control are elaborated by an information system development example.
文中结合信息系统开发实例,详细介绍了该方法在被动式的基于角色访问控制中的实现原理及其使用方法。
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
Following the systematical analysis of the whole framework and the mechanism of DCE, the method of role-based access control is designed within the DCE environment.
系统分析了DCE的总体框架和安全机制,研究了基于博士学位论文摘要角色的访问控制机制的设计,提出了在DCE环境中实现基于角色的访问控制方法。
This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.
该文介绍了RBAC与代理机制相结合所带来的授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型。
The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.
标准的基于角色访问控制(RBAC)通过角色对用户和权限进行解耦,从受控资源角度来讲是一维的。
Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.
从实验室教学管理系统的特点出发,讨论了基于角色的访问控制模型RBAC在实验室教学管理系统中应用的优势。
This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.
另一方面是对网络系统实施有效的安全管理,做好网络数据的备份和网络用户的管理两项工作。
This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.
介绍了自主访问控制、强制访问控制和基于角色的访问控制三种主流的访问控制策略,并进行了对比分析。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.
借鉴基于角色的访问控制基本思想,结合开发实践,提出了一种用VJ实现用户权限管理的方法。
You learned how WebSphere service Registry and Repository provides role-based access control and how it can be used to manage services and service-related entities such as contracts.
您已经了解到WebSphereServiceRegistry andRepository如何提供基于角色的访问控制,以及如何使用它来管理服务以及与服务相关的实体(如契约)。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
应用推荐