discretionary access control 中文意思是什麼

discretionary access control 解釋
自由存取控制
  • discretionary : 可自行選用的
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  1. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  2. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  3. In discretionary access control lists dacls are removed

    的任何審核ace將被移除。
  4. The mixed access control of this model that combines mandatory access control with discretionary access control is described in detail

    詳細討論了模型的混合訪問控制方法,即強制訪問控制與uosd訪問矩陣相結合的方法。
  5. Discretionary access control ( dac ) is one of necessary and most common secure mechanisms in the secure operating system

    自主訪問控制機制( discretionaryaccesscontrol )是安全操作系統必不可少的、應用最廣泛的安全機制之一。
  6. Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage, dac would lead to access transfer and mac is lack of access mechanism in same level

    傳統的自主訪問控制dac和強制訪問控制mac都各自的缺點, dac會出現訪問傳遞問題,而mac在同級間缺乏控制機制。
  7. The model is also applicable for xml schema documents. a flexible and practical method to enforce discretionary access control ( dac ) policy on xml documents is presented in this paper

    2 )提出了一種靈活實用的方法對xml文檔實施自主訪問控制策略,該方法基於功能強大的xml模式而不是傳統的dtd技術。
  8. Through researching on various access control mechanisms, an authorization management approach is introduced which combine discretionary access control with role - based access control

    通過對各種訪問控制機制的研究,提出了採用自主訪問控制與基於角色的訪問控制相結合的方法對企業電子文檔的權限進行管理。
  9. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ), mandatory access control ( mac ) and least privilege management. finest granularity dac allows that the owner of an object can choose to grant access permission to any other user

    本論文主要在文件訪問控制和特權管理這兩方面對linux的安全性進行增強,即實現了細粒度的自主訪問控制、強制訪問控制、以及最小特權管理。
  10. Discretionary access control

    任意訪問控制
  11. Presents platform sdk recommendations about privileges, buffer overruns, discretionary access control lists dacls, and passwords

    介紹有關的platform sdk建議,包括特權、緩沖區溢出、任意訪問控制列表( dacl )和密碼。
  12. Nevertheless, some traditional approaches, such as discretionary access control and mandatory access control, are not suitable for systems where more sophisticated access control is needed. as a result, rbac has become a hotspot in research community in recent years

    然而,傳統的訪問控制技術? ?自主型訪問控制和強制型訪問控制,遠遠落後于當代系統安全的需求,基於角色的訪問控制( role - basedaccesscontrol ,簡稱rbac )作為一種新型的訪問控制技術成為了近年來相關領域研究的熱點。
  13. In the beginning of the thesis, we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control. then we indicate the deficiency of the comparison of the security label in the practical application, and give the improved rules of security label comparison

    本文首先介紹了開發b1級安全數據庫的安全模型及其關鍵技術,著重描述了自主和強制訪問控制的模型,然後指出blp模型安全級的比較在實際應用中的不足,給出改進的安全級比較規則。
  14. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體化,通過研究發現該模型採用強制性安全策略,不易做到靈活的安全控制,因此添加自主存取控制機制的安全策略對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式數據庫自主與強制性)安全機制。基於實體化規則原理,設計了一個採用ddm安全機制的數據庫控制器? ? dds ( distributeddatabasesecure ,分散式數據庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分散式數據庫安全控制。
分享友人