授權模型 的英文怎麼說

中文拼音 [shòuquánxíng]
授權模型 英文
take grant model
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • 授權 : empower; authorize; warrant
  • 模型 : 1 (仿製實物) model; pattern 2 (制砂型的工具) mould; pattern3 (模子) model set; mould patter...
  1. While discussing the future development trend of chinese ngos in transformation period, the author suggests that ngos set up good inter - dynamic relations with governments, establish effective communicative channels and communion mechanism, try to construct a new mode of cooperation between government and society. the proposed solution can be simply described as follows : let ngos play their roles on the things that the government are unable or unwilling to do, sufficient mandate and support from the government ; on the things that both the government and ngos can do, let ngos give full paly of their roles ; leave the government only to with things that beyond the powers of the market or the ngos

    在從宏觀上探討轉期中國非政府組織的未來發展的趨勢時,強調非政府組織與政府的良好互動關系,建立有效的溝通渠道和交流機制,試圖構建一種「政府與社會合作」的新式。具體分工思路是:在政府不能或不應做的事情上發揮非政府組織的作用,政府予以充分的和支持;在政府行政手段和社會自治方式都可以完成的事情上,盡量發揮非政府組織的作用;而政府只去履行市場和非政府組織都無法完成的職能。
  2. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典訪問控制基礎上,給出了一個網路化製造系統的綜合訪問控制,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考和訪問控制過程,並定義了各個中的相關元素和關系,給出了各級約束驗證和的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  3. 5. we solve the discovery problem by developing a complete authorization certificate query protocol for distributed environment based on clarke ' s discovery algorithm [ 132 ] for local certificate databases

    設計了完整的證書鏈查詢協議,結合clarke本地證書鏈發現演算法[ 132 ] ,解決了p2p信任授權模型證書鏈的決定問題。
  4. Extensive detecting technology is researched mainly by a group which is directed by professor yu yongquan. basing on the studies of several scholars who have devoted themselves in extensive detecting technology, this paper establishes the basic framework of extensive detecting technology development flat station. also this paper focuses on the key technologies of extensive detecting technology : strategy building and focus matter - element filter of extensive detection

    可拓檢測目前在世界上主要是由余永領導的團隊在研究,本文在前面幾位學者研究的基礎上,對可拓檢測開發平臺的機理進行探討,構建可拓檢測開發平臺的基本框架,並研究可拓檢測方法的關鍵技術:可拓檢測的策略生成以及焦點物元提取。
  5. Its streamline, blocking assembly production and the media - like, broadcast - like sales represent a new conception of business

    它的流程化、塊化組裝生產和媒體式、廣播式銷售代表了一種新的企業生產和銷售框架。
  6. Modeling organizations is theorizing about the structure, governance ( including the constraints defining the incentive structure internal to the organization ), and policies of purposive entitles

    化組織就理論化關于結構、管理(包括決定組織內部激勵結構的約束) ,以及有目的的力的政策。
  7. Finally, studies the instruction system of cos upon a dedicated instruction of smartcos - xc. chapter 4 discusses the smartcos - xc and gives the design and implementing of a smart card file system framework. based on this, this paper gives a simulation of head - end encryption of entitlement control message ( ecm ) and entitlement management message ( emm ), and implements the decryption of ecm and emm in the smart card

    在對通用cos的研究的基礎上,首先簡單分析了smartcos - xc ,結合該cos ,論文針對有條件接收系統,按不同用途、不同類分別設計並實現了存儲用戶及智能卡應用的文件體系結構,通過該cos的指令系統,設計並實現了擬前端控制信息( entitlementcontrolmessage , ecm ) 、管理信息( entitlementmanagementmessage , emm )數據生成塊及用戶端ecm 、 emm解密塊。
  8. A discrepancy in the authorization model

    授權模型的矛盾
  9. V4 conforms to the j2ee 1. 2 authorization model, which is based on security roles rather than method groups

    V4符合j2ee 1 . 2基於安全性角色而不是方法組的授權模型
  10. Together, the java 2 platform security architecture and jaas comprise the current java authorization model

    Java 2平臺安全體系結構和jaas共同構成了當前的java授權模型
  11. Like other components of the sql server authorization model, principals can be arranged in a hierarchy

    與sql server授權模型的其他組件一樣,主體也可以按層次結構排列。
  12. Abstract : based on the authentication model for user, the multilayer - authentication model of authentication manager was advocated

    摘要在以用戶為中心的授權模型的基礎上,提出了管理器的層次
  13. Through role - based security, reporting services provides an authorization model, but it does not include an authentication component

    通過基於角色的安全性, reporting services提供了一種授權模型,但它並不包含身份驗證組件。
  14. Security is another major area of change with the transition from the websphere security authorization model to role - based security

    安全性是更改的另一個主要方面,它體現在從websphere安全性授權模型到基於角色安全性的轉變中。
  15. In the sections that follow, i ll focus on the user - centric authorization model of the java authentication and authorization service

    在下面一節中,我將重點介紹java認證和服務( java authentication and authorization service )的以用戶為中心的授權模型
  16. I ve documented a discrepancy in the jaas authorization model and also described a practical workaround, offering a real - world implementation as its example

    我介紹了jaas授權模型中的一個矛盾之處,並描述了一種解決它的實用方法,並提供了它的現實世界實現的一個例子。
  17. Aiming the applications of pki at peer - to - peer networks ( p2p ), we provide an elegant composite model for trust and authorization to solve trust management problem efficiently

    本文針對p2p網路應用環境,提出了「復合式」的信任授權模型,有效的解決了信任管理這一問題。
  18. You ve learned the underpinnings of both the code - based authorization model of the original java 2 platform security architecture and the user - based authorization framework introduced with jaas

    介紹了原來java 2平臺安全體系結構的基於代碼的授權模型和在jaas中引入的基於用戶的框架。
  19. Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization

    第三,在深入研究多級安全、完整性、基於角色的授權模型等基礎上,首先提出了一個修改blp( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp、 clark - wilson、 dte、 rbac有機地集成應用,提升出一個支持機密性、完整性和等多安全策略的,可實現動態的訪問控制( daacm ) 。
  20. The new authorization model in plam can be integrated into the communication layer rpc sockets to securely transmit authorization information to the target resource manager

    Plam中的新授權模型可以集成到通信層( rpc / socket )中,從而將信息安全地傳輸給目標資源管理器。
分享友人