自主訪問控制 的英文怎麼說

中文拼音 [zhǔfǎngwènkòngzhì]
自主訪問控制 英文
discretionary access control
  • : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 自主 : 1 (自己做主) act on one s own; be one s own master; decide for oneself; keep the initiative in ...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. Fourth, design the whole access check strategy and the dac frame

    四、設計了自主訪問控制整體框架和安全檢查策略。
  2. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強以及基於biba模型的強等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  3. But this is premised on the perfect communication between field machines and remote monitor. thus a polling way was defined to control the media access to the bus built with rs - 485 interface. within the long period of test run, the whole system was proved to be effective

    項目中利用rs - 485介面組成總線網,採用定義的輪詢方式總線的介質,經過反復調試,成功實現了多個從機與單臺監機之間同時進行的實時通信。
  4. Secure operating system places its focus on controlling user ’ s access to prevent illegal operations, marking the user and authentication to guarantee the security and integrality. access control technology plays an important role to enforce operating system security. now, research on access control in embedded real time operating system ( ertos ) is just at the prime stage

    操作系統安全的要目標包括根據系統安全策略對用戶的操作進行,防止其對計算機資源的非法存取;標識用戶並進行身份鑒別;保證操作系統運行的安全性;保證系統身的安全性和完整性。
  5. This dac mechanism works well in the secimos system, making it a solid ground for future research and development in dac direction

    因而本文可作為將來在自主訪問控制方面進一步深入研究和發展的基礎。
  6. Discretionary access control ( dac ) is one of necessary and most common secure mechanisms in the secure operating system

    自主訪問控制( discretionaryaccesscontrol )是安全操作系統必不可少的、應用最廣泛的安全機之一。
  7. Delegation enhances the flexibility of authorization in access control and can be seen as a implement of dac security policy in some degrees

    委託增加了中授權的靈活性,可看作在一定程度上實現了自主訪問控制( dac )安全策略。
  8. Compared with traditional dac and mac models, role - based access control ( rbac ) model can provide better flexibility and scalability

    基於角色模型rbac比傳統的自主訪問控制和強更加優越,提供了更高的靈活性和擴展性。
  9. Based on various research results and practical experiences, we found that there is much to be done to improve dac mechanism in usability and security aspects

    綜合國際上已有的研究成果來看,隨著越來越高的實際安全需要,自主訪問控制在安全性和實用性方面都存在著可改進之處。
  10. Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage, dac would lead to access transfer and mac is lack of access mechanism in same level

    傳統的自主訪問控制dac和強mac都各的缺點, dac會出現傳遞題,而mac在同級間缺乏
  11. The model is also applicable for xml schema documents. a flexible and practical method to enforce discretionary access control ( dac ) policy on xml documents is presented in this paper

    2 )提出了一種靈活實用的方法對xml文檔實施自主訪問控制策略,該方法基於功能強大的xml模式而不是傳統的dtd技術。
  12. Through researching on various access control mechanisms, an authorization management approach is introduced which combine discretionary access control with role - based access control

    通過對各種的研究,提出了採用自主訪問控制與基於角色的相結合的方法對企業電子文檔的權限進行管理。
  13. The thesis overview the dac theory and the most commonly used dac mechanisms firstly. then, compatible with the remaining simple yet powerful file permission model, the acl introduced

    本論文首先對自主訪問控制的原理和實施機進行研究分析,然後給出secimos安全操作系統的自主訪問控制的設計與實現。
  14. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ), mandatory access control ( mac ) and least privilege management. finest granularity dac allows that the owner of an object can choose to grant access permission to any other user

    本論文要在文件和特權管理這兩方面對linux的安全性進行增強,即實現了細粒度的自主訪問控制、強、以及最小特權管理。
  15. Nevertheless, some traditional approaches, such as discretionary access control and mandatory access control, are not suitable for systems where more sophisticated access control is needed. as a result, rbac has become a hotspot in research community in recent years

    然而,傳統的技術? ?和強,遠遠落後于當代系統安全的需求,基於角色的( role - basedaccesscontrol ,簡稱rbac )作為一種新型的技術成為了近年來相關領域研究的熱點。
  16. In the beginning of the thesis, we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control. then we indicate the deficiency of the comparison of the security label in the practical application, and give the improved rules of security label comparison

    本文首先介紹了開發b1級安全數據庫的安全模型及其關鍵技術,著重描述了和強的模型,然後指出blp模型安全級的比較在實際應用中的不足,給出改進的安全級比較規則。
  17. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的要研究內容包括:對目前我國列車運行圖管理體和編流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的權限和數據安全題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路身安全性和黑客攻擊與侵入題,詳細討論綜合採用差錯、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  18. Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization

    第三,在深入研究多級安全模型、完整性模型、基於角色的授權模型等基礎上,首先提出了一個修改blp模型( mblp )的方案,並在一個開發的安全操作系統中得到了應用;然後通過將blp模型、 clark - wilson模型、 dte模型、 rbac模型有機地集成應用,提升出一個支持機密性、完整性和授權等多安全策略的,可實現動態授權的模型( daacm ) 。
  19. This paper analyzes the architecture of distributed firewalls based on comparing with the traditional firewalls : network firewalls and personal firewalls. it brings forward a new design about the distributed firewalls in which some host firewalls and a control center constitute the whole distributed firewalls with reserving the old network firewalls. a host firewall is a packet - filtering firewall that filters the network packets come from inside the network based on the information of network application program, ip address, tcp or udp port and so on

    本文在與傳統的網路防火墻、個人防火墻技術對比的基礎之上,結合計算機網路安全的本質與要求,對分散式防火墻這一全新的防火墻體系結構進行了分析,提出一種充分利用現有技術和投資的分散式防火墻系統的設計方案,即在保留傳統網路邊界防火墻的同時,設計一種駐留在內部網路終端的機防火墻及其中心,將防火墻延伸到內部網路的終端,從而有效防範來網路內部的非法與惡意破壞。
分享友人