• A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.

    针对基于角色访问控制(RBAC)模型由于继承关系产生角色不能拥有私有权限问题进行了研究。

    youdao

  • In this paper, we introduce the role-based access control model, analyse the role hierarchy model and the problem of private permissions in RBAC96, and point out the disadvantage of Sandhu s solution.

    针对著名 RBAC96模型的不足之 ,结合私有权限、部门权限权限属性变化等问题 ,对角色权限角色层次关系进行了分析 ,提出了一个改进的角色层次化关系模型 。

    youdao

  • In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.

    认为软件架构师重要事情小心思考应用程序业务角色,将它们紧紧地映射一个基于角色访问控制系统

    youdao

  • In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.

    AIX 6.1中,IBM引入了基于角色访问控制(RBAC),解决了sudo许多安全和审计问题

    youdao

  • As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.

    作为基于标签访问控制(LBAC)的DB 2 Viper 2数据库角色增强一部分可以对一个角色授予收回安全标签豁免权

    youdao

  • As such, I will focus the remainder of this article on learning about the role of the subject class in JAAS, with an in-depth discussion of subject-based access control.

    因此本文其余部分着重介绍JAASsubject作用深入讨论基于subject访问控制。

    youdao

  • The domain's support provides this key feature to augment the functionality provided by the Role Based Access Control (RBAC).

    支持提供这个关键特性以此补充Role Based Access Control (RBAC)提供功能

    youdao

  • Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.

    在有这个命令之前需要使用Role - Based Access Control (RBAC)帮助纠正setuidsetgid程序问题

    youdao

  • As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.

    基于角色访问控制(RBAC)作为安全机制当前研究热点之一

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • A new model, role access control model based on resource abstract (RD_RBAC), is proposed in the paper.

    论文提出一种新的访问控制模型基于资源抽象角色访问控制模型(RD_RBAC)。

    youdao

  • Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.

    实验室教学管理系统特点出发,讨论基于角色访问控制模型RBAC实验室教学管理系统中应用优势

    youdao

  • In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    youdao

  • Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.

    而基于角色访问控制模型角色为中介,将用户权限逻辑隔离该模型不能处理执行顺序的任务;

    youdao

  • The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.

    标准的基于角色访问控制RBAC通过角色用户权限进行解耦,受控资源角度来讲一维的。

    youdao

  • Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).

    限制可以视为基于角色的访问控制(RBAC)主要动机

    youdao

  • The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.

    论文研究基于角色访问控制技术及其法院系统中的应用

    youdao

  • In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    系统采用了信任机制、基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    youdao

  • This paper analyzes the characteristics of Spacecraft Fault Diagnosis System and the basic idea and principle of Role-Based Access Control model.

    文章介绍了基于角色权限管理模型基本思想工作原理,并分析航天器故障诊断系统权限管理的特征

    youdao

  • This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.

    一方面网络系统实施有效安全管理,做好网络数据备份网络用户的管理项工作。

    youdao

  • Second, it USES resource proxy pattern to realize role-based access control of mobile agents. Thus, it can give the sensitivity resource double protection.

    采用资源代理模式实现移动代理基于角色权限特化,敏感资源进行双重保护

    youdao

  • Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.

    借鉴基于角色访问控制基本思想,结合开发实践,提出一种VJ实现用户权限管理方法

    youdao

  • This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.

    论文对自主访问控制强制访问控制基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择实现了基于角色的权限管理系统

    youdao

  • This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.

    该文介绍了RBAC代理机制相结合所带来授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型。

    youdao

  • A new model, role access control model based on authentication trustworthiness (AT-RBAC) is proposed in the paper.

    提出基于认证可信度角色访问控制模型(AT - RBAC)。

    youdao

  • Following the systematical analysis of the whole framework and the mechanism of DCE, the method of role-based access control is designed within the DCE environment.

    系统分析DCE总体框架安全机制,研究基于博士学位论文摘要角色访问控制机制的设计,提出了DCE环境中实现基于角色访问控制方法

    youdao

  • Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.

    访问控制技术网络安全一项基本技术,主要包括基于角色访问控制基于任务的访问控制等技术。

    youdao

  • Role-based delegation is now one of kernel problems in the area of access control.

    基于角色代理当前访问控制领域研究的核心问题之一

    youdao

  • Role-based delegation is now one of kernel problems in the area of access control.

    基于角色代理当前访问控制领域研究的核心问题之一

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定