access control model 中文意思是什麼

access control model 解釋
平臺下的存儲控制模型
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • model : n 1 模型,雛型;原型;設計圖;模範;(畫家、雕刻家的)模特兒;樣板。2 典型,模範。3 (女服裝店僱...
  1. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。
  2. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  3. Use role model to realize traditional access control

    用角色模型實現傳統訪問控制
  4. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  5. Traditional access control model hardly consider the issue of subjects ' trust worthiness and privilege partition

    傳統訪問控制模型在授權過程中沒有考慮主體的信任度和權限集合劃分等問題。
  6. Access control model of 2 - d spatial region based on spatial index

    基於空間索引的二維空間區域訪問控制模型
  7. The 2 - d access control model of spatial data was presented

    定義了其授權和訪問請求判斷的規則和約束條件。
  8. 3. access conirol in collaborative design an access control model is presented in this thesis which is also based on the ft hierarchical structure model

    ( 3 )協同設計中的訪問控制對訪問控制機制進行了研究,提出一個基於樹形層次結構的訪問控制模型。
  9. It analyzes the key factors of human resource modeling, the ways to select resource, the primary strategy base of allocating resources dynamically and the access control model of operating system and database system. because cmm ( capability maturity model ) and rup ( rational unified process ) are too complex to use properly in the small organization, a human resource management model of middle / small software developing organization is proposed. it is based on the cmm and rup model and combined with our working experience

    本文分析了資源管理的要素、分配策略、確定了資源選擇方法和權限管理方式,對人力資源進行建模管理,並參考cmm ( capabilitymaturitymodel )和rup ( rationalunifiedprocess )的資源管理,歸並相關角色,結合作者的工作經驗,提出了一個中小型企業軟體開發人力資源模型,與資源管理模塊配合使用。
  10. Process oriented project management system access control model

    關節炎自我管理項目中國化策略探索
  11. Secondly, it focuses on the technology of b / s mode developed on lotus domino / notes platfom. afterwards it presents a role - based access control model to sovel the problem of an normal document visited and operated safely by a different figure belong to a different department. and it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine

    接著重點研究了在lotusdomino / notes平臺上實現web訪問方式的技術特點,同時引入了基於角色的安全訪問控制模型,解決了不同部門、不同身份的用戶訪問不同的文檔信息和對文檔的安全操作,使辦公文檔得以安全控制;在角色的安全訪問控制模型的基礎上,提出了基於角色控制的安全工作流模型,使文檔在工作流引擎的驅動下,在網路環境中流向正確用戶。
  12. Role - based access control model of land use and planning manage information system

    的土地利用規劃管理信息系統體系結構研究
  13. Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization

    第三,在深入研究多級安全模型、完整性模型、基於角色的授權模型等基礎上,首先提出了一個修改blp模型( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp模型、 clark - wilson模型、 dte模型、 rbac模型有機地集成應用,提升出一個支持機密性、完整性和授權等多安全策略的,可實現動態授權的訪問控制模型( daacm ) 。
  14. Mac, nist - rbac access control model ; 2. analyzes the access control needs of the applied electronic government system ; 3. uses the language of uml to proceed the detailed design to the system of rbac ; 4, uses the language of xml to describe access control information to the model of rbac and illustrates alternant techniques of xml realization in the distributed type of network environment ; 5

    在訪問控制設計部分,本文做了如下工作: 1 、對dac 、 mac 、 nist - rbac訪問控制模型進行了分析比較; 2 、分析了電子政務應用系統的訪問控制需求; 3 、用uml語言對rbac系統進行了較為詳細的設計; 4 、用xml語言對rbac模型的訪問控制信息進行了描述,並闡述了分散式網路環境下xml交互的實現技術。
  15. The thesis use role based access control model, design a set of logical data model and propose the basic algorithm for access database

    在數據訪問控制方面採用了基於角色的安全策略,設計了數據訪問控制的邏輯模型和基本方法。
  16. Analysis and comparison of administrative role - based access control model

    基於角色的訪問控制管理模型的分析與比較
  17. Trusted network connect based on access control model for data acquisition system

    基於可信網路連接的數據採集系統訪問控制模型
  18. In the 4th chapter, the integrated user access control model was studied

    第四章研究了網路化製造系統的用戶綜合訪問控制模型。
  19. Explains the portal access control model and how to optimize your portal s performance using it

    :解釋portal access control模型以及如何使用它來優化您的門戶的性能。
  20. A multi policy access control model applied to ertos is brought forward, which integrates several access control policies

    當前,對嵌入式實時操作系統訪問控制技術的研究還處于起步階段。
分享友人