access control models 中文意思是什麼

access control models 解釋
接入控制模型
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • models : 模特
  1. Based on the three elementary business models such as e - shopping, contract signing and receipt for e - goods, the aim of this project is to design, implement and deploy the middleware components such as secure exchange component and user authentication and access control component, which accord with j2ee and corba architecture

    它以常見的交易活動如電子購物、合同簽定、電子簽收作為基本交換模型,為不同應用系統提供具有符合j2ee和corba體系規范的安全交換組件、用戶認證及入口控制組件。
  2. Compared with traditional dac and mac models, role - based access control ( rbac ) model can provide better flexibility and scalability

    基於角色訪問控制模型rbac比傳統的自主訪問控制和強制訪問控制更加優越,提供了更高的靈活性和擴展性。
  3. Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage, dac would lead to access transfer and mac is lack of access mechanism in same level

    傳統的自主訪問控制dac和強制訪問控制mac都各自的缺點, dac會出現訪問傳遞問題,而mac在同級間缺乏控制機制。
  4. Base on lsm framework, many different access control models have been implemented as loadable kernel modules. this paper has researched the mechanism of the lsm, and implemented a kind of security auditing policy

    本文對lsm的設計和安全策略的實現進行深入的研究,並運用lsm的可移植性提出了一種基於lsm的通用安全審計系統。
  5. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。
  6. Intrusion detection system is an active security technology developed in the recent decade, which integrates detection, audit, alert and response function. as an important part in information security mechanism, it supplies a gap for access control and identity authentication, thus becoming a main study area. in this thesis, the various intrusion detection models and detection methods are firstly categorized and studied, merits and defaults of which are discussed in detail, then the intrusion response system and intrusion traceback are studied

    本論文對現有的各種入侵檢測模型和技術進行了系統歸類和分析研究,詳細討論了各檢測分析技術的優點和存在的不足;對入侵響應系統和入侵追蹤技術進行了初步的研究;在研究基於靜態自治代理和移動代理的入侵檢測基礎上,設計了一種基於多代理的分散式入侵檢測與響應系統模型( multi - agent - basedintrusiondetectionresponsesystem , maidrs ) 。
  7. In the beginning of the thesis, we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control. then we indicate the deficiency of the comparison of the security label in the practical application, and give the improved rules of security label comparison

    本文首先介紹了開發b1級安全數據庫的安全模型及其關鍵技術,著重描述了自主和強制訪問控制的模型,然後指出blp模型安全級的比較在實際應用中的不足,給出改進的安全級比較規則。
  8. In uarbac, effort is made to combine the advantages of above models and the runtime constraint together. and then, the uarbac is applied to an intranet multi - server file access control system

    然後,將對這集中模型做比較分析,並在比較分析的基礎上,提出一個新的訪問控制模型? ? uarbac ( upgradedadministrativerole - basedaccesscontrol ) 。
  9. Since the workflow management not only has to manage relationships and data flow among activities, but also has to manage resources needing by activities, data access control, versions of design object generating with workflow, function models, namely, document management based on workflow, version management of product structure and documents, access control management, are discussed and theirs realized principles and applications are presented also

    由於工作流管理不僅要管理活動與活動之間的關系和數據流向,還要對活動所需的資源、活動的訪問權限以及對隨工作流產生的設計對象的版本進行管理。論文還對基於工作流的文檔管理、產品結構和文檔的版本管理、權限控制管理的理論與應用進行了論述。
  10. Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization

    第三,在深入研究多級安全模型、完整性模型、基於角色的授權模型等基礎上,首先提出了一個修改blp模型( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp模型、 clark - wilson模型、 dte模型、 rbac模型有機地集成應用,提升出一個支持機密性、完整性和授權等多安全策略的,可實現動態授權的訪問控制模型( daacm ) 。
分享友人