Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
在AIX 6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
AIX provides a facility to delegate administrative roles to non-root users through role-based access control (RBAC) mechanism.
AIX提供了一种功能,可通过基于角色的访问控制(RBAC)机制将管理角色委托给非root用户。
The domain's support provides this key feature to augment the functionality provided by the Role Based Access Control (RBAC).
对域的支持提供这个关键特性,以此补充Role Based Access Control (RBAC)提供的功能。
Role-based access control (RBAC)
基于角色的访问控制 (RBAC)
Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.
在有这个命令之前,您需要使用Role - Based Access Control (RBAC)来帮助纠正setuid和setgid程序的问题。
As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.
基于角色的访问控制(RBAC)作为一种安全机制,是当前研究的热点之一。
Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.
从实验室教学管理系统的特点出发,讨论了基于角色的访问控制模型RBAC在实验室教学管理系统中应用的优势。
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.
标准的基于角色访问控制(RBAC)通过角色对用户和权限进行解耦,从受控资源角度来讲是一维的。
Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).
限制可以视为是基于角色的访问控制(RBAC)的主要动机。
The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.
本论文研究基于角色的访问控制技术及其在法院系统中的应用。
A new model, role access control model based on authentication trustworthiness (AT-RBAC) is proposed in the paper.
提出一种基于认证可信度的角色访问控制模型(AT - RBAC)。
The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.
可采用单点登陆、PKI认证、授权、基于角色的权限分配策略、利用应用网关访问资源,开发适合本系统的工作流访问机制等措施确保信息平台的安全。
A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.
针对基于角色的访问控制(RBAC)模型中由于继承关系产生的子角色不能拥有私有权限问题进行了研究。
Role Based Access Control(RBAC)is a kind of access control mechanism which is convenient, secure and of high performance.
基于角色的访问控制RBAC是一种方便、安全、高效的访问控制机制。
Role -based access control (RBAC) is a kind of access control mechanism which is convenient, secure and of high -performance.
基于角色访问控制(RBAC)是一种方便、安全、高效的访问控制机制。
Role -based access control (RBAC) is a kind of access control mechanism which is convenient, secure and of high -performance.
基于角色访问控制(RBAC)是一种方便、安全、高效的访问控制机制。
应用推荐