授權模型 的英文怎麼說
中文拼音 [shòuquánmóxíng]
授權模型
英文
take grant model- 授 : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
- 權 : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
- 模 : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
- 授權 : empower; authorize; warrant
- 模型 : 1 (仿製實物) model; pattern 2 (制砂型的工具) mould; pattern3 (模子) model set; mould patter...
-
While discussing the future development trend of chinese ngos in transformation period, the author suggests that ngos set up good inter - dynamic relations with governments, establish effective communicative channels and communion mechanism, try to construct a new mode of cooperation between government and society. the proposed solution can be simply described as follows : let ngos play their roles on the things that the government are unable or unwilling to do, sufficient mandate and support from the government ; on the things that both the government and ngos can do, let ngos give full paly of their roles ; leave the government only to with things that beyond the powers of the market or the ngos
在從宏觀上探討轉型期中國非政府組織的未來發展的趨勢時,強調非政府組織與政府的良好互動關系,建立有效的溝通渠道和交流機制,試圖構建一種「政府與社會合作」的新型模式。具體分工思路是:在政府不能或不應做的事情上發揮非政府組織的作用,政府予以充分的授權和支持;在政府行政手段和社會自治方式都可以完成的事情上,盡量發揮非政府組織的作用;而政府只去履行市場和非政府組織都無法完成的職能。We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac
本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。5. we solve the discovery problem by developing a complete authorization certificate query protocol for distributed environment based on clarke ' s discovery algorithm [ 132 ] for local certificate databases
設計了完整的授權證書鏈查詢協議,結合clarke本地證書鏈發現演算法[ 132 ] ,解決了p2p信任授權模型中授權證書鏈的決定問題。Extensive detecting technology is researched mainly by a group which is directed by professor yu yongquan. basing on the studies of several scholars who have devoted themselves in extensive detecting technology, this paper establishes the basic framework of extensive detecting technology development flat station. also this paper focuses on the key technologies of extensive detecting technology : strategy building and focus matter - element filter of extensive detection
可拓檢測目前在世界上主要是由余永權教授領導的團隊在研究,本文在前面幾位學者研究的基礎上,對可拓檢測開發平臺的機理進行探討,構建可拓檢測開發平臺模型的基本框架,並研究可拓檢測方法的關鍵技術:可拓檢測的策略生成以及焦點物元提取。Its streamline, blocking assembly production and the media - like, broadcast - like sales represent a new conception of business
它的流程化、模塊化組裝生產和媒體式、廣播式授權銷售代表了一種新型的企業生產和銷售框架。Modeling organizations is theorizing about the structure, governance ( including the constraints defining the incentive structure internal to the organization ), and policies of purposive entitles
模型化組織就理論化關于結構、管理(包括決定組織內部激勵結構的約束) ,以及有目的的授予權力的政策。Finally, studies the instruction system of cos upon a dedicated instruction of smartcos - xc. chapter 4 discusses the smartcos - xc and gives the design and implementing of a smart card file system framework. based on this, this paper gives a simulation of head - end encryption of entitlement control message ( ecm ) and entitlement management message ( emm ), and implements the decryption of ecm and emm in the smart card
在對通用cos的研究的基礎上,首先簡單分析了smartcos - xc ,結合該cos ,論文針對有條件接收系統,按不同用途、不同類型分別設計並實現了存儲用戶授權及智能卡應用的文件體系結構,通過該cos的指令系統,設計並實現了模擬前端授權控制信息( entitlementcontrolmessage , ecm ) 、授權管理信息( entitlementmanagementmessage , emm )數據生成模塊及用戶端ecm 、 emm解密模塊。A discrepancy in the authorization model
授權模型的矛盾V4 conforms to the j2ee 1. 2 authorization model, which is based on security roles rather than method groups
V4符合j2ee 1 . 2基於安全性角色而不是方法組的授權模型。Together, the java 2 platform security architecture and jaas comprise the current java authorization model
Java 2平臺安全體系結構和jaas共同構成了當前的java授權模型。Like other components of the sql server authorization model, principals can be arranged in a hierarchy
與sql server授權模型的其他組件一樣,主體也可以按層次結構排列。Abstract : based on the authentication model for user, the multilayer - authentication model of authentication manager was advocated
摘要在以用戶為中心的授權模型的基礎上,提出了授權管理器的授權層次模型。Through role - based security, reporting services provides an authorization model, but it does not include an authentication component
通過基於角色的安全性, reporting services提供了一種授權模型,但它並不包含身份驗證組件。Security is another major area of change with the transition from the websphere security authorization model to role - based security
安全性是更改的另一個主要方面,它體現在從websphere安全性授權模型到基於角色安全性的轉變中。In the sections that follow, i ll focus on the user - centric authorization model of the java authentication and authorization service
在下面一節中,我將重點介紹java認證和授權服務( java authentication and authorization service )的以用戶為中心的授權模型。I ve documented a discrepancy in the jaas authorization model and also described a practical workaround, offering a real - world implementation as its example
我介紹了jaas授權模型中的一個矛盾之處,並描述了一種解決它的實用方法,並提供了它的現實世界實現的一個例子。Aiming the applications of pki at peer - to - peer networks ( p2p ), we provide an elegant composite model for trust and authorization to solve trust management problem efficiently
本文針對p2p網路應用環境,提出了「復合模式」的信任授權模型,有效的解決了信任管理這一問題。You ve learned the underpinnings of both the code - based authorization model of the original java 2 platform security architecture and the user - based authorization framework introduced with jaas
介紹了原來java 2平臺安全體系結構的基於代碼的授權模型和在jaas中引入的基於用戶的授權框架。Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization
第三,在深入研究多級安全模型、完整性模型、基於角色的授權模型等基礎上,首先提出了一個修改blp模型( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp模型、 clark - wilson模型、 dte模型、 rbac模型有機地集成應用,提升出一個支持機密性、完整性和授權等多安全策略的,可實現動態授權的訪問控制模型( daacm ) 。The new authorization model in plam can be integrated into the communication layer rpc sockets to securely transmit authorization information to the target resource manager
Plam中的新授權模型可以集成到通信層( rpc / socket )中,從而將授權信息安全地傳輸給目標資源管理器。分享友人