mandatory access control 中文意思是什麼

mandatory access control 解釋
強制訪問控制
  • mandatory : adj 命令的,訓令的;委任的,委託的 (upon); 〈美國〉強迫的,義務性質的。 mandatory administrati...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  1. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  2. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  3. The mixed access control of this model that combines mandatory access control with discretionary access control is described in detail

    詳細討論了模型的混合訪問控制方法,即強制訪問控制與uosd訪問矩陣相結合的方法。
  4. In this technique, to control the users ' accesses, the role - based access control ( rbac ) and the mandatory access control ( mac ) were integrated to construct access matrix

    在該顯示技術中,結合角色的訪問控制與強制的訪問控制,建立訪問矩陣對用戶進行訪問控制。
  5. Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage, dac would lead to access transfer and mac is lack of access mechanism in same level

    傳統的自主訪問控制dac和強制訪問控制mac都各自的缺點, dac會出現訪問傳遞問題,而mac在同級間缺乏控制機制。
  6. How to enforce mandatory access control ( mac ) policy on xml documents is first proposed

    3 )首次討論了在xml文檔中實施強制訪問控制策略的方法。
  7. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ), mandatory access control ( mac ) and least privilege management. finest granularity dac allows that the owner of an object can choose to grant access permission to any other user

    本論文主要在文件訪問控制和特權管理這兩方面對linux的安全性進行增強,即實現了細粒度的自主訪問控制、強制訪問控制、以及最小特權管理。
  8. Mandatory access control modeling and security analysis : a petri - nets based method

    網的強制訪問控制模型及其安全分析
  9. Mandatory access control

    強制訪問控制
  10. This linux version incorporates a strong, flexible mandatory access control architecture into the kernel

    :這個linux版本將強大、靈活的強制訪問控制體系結構融入內核之中。
  11. This model can assign and manage the security labels of subject and object efficiently, implement mandatory access control between them

    本文研究訪問控制技術,分析傳統嵌入式實時操作系統在安全方面存在的不足。
  12. Put forward a control model which meet the demand of the security protection for spatial database and implement the mandatory access control

    提出了適合於空間數據安全保護需求的控制模型,實現對空間數據的強制安全保護。
  13. Nevertheless, some traditional approaches, such as discretionary access control and mandatory access control, are not suitable for systems where more sophisticated access control is needed. as a result, rbac has become a hotspot in research community in recent years

    然而,傳統的訪問控制技術? ?自主型訪問控制和強制型訪問控制,遠遠落後于當代系統安全的需求,基於角色的訪問控制( role - basedaccesscontrol ,簡稱rbac )作為一種新型的訪問控制技術成為了近年來相關領域研究的熱點。
  14. In the beginning of the thesis, we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control. then we indicate the deficiency of the comparison of the security label in the practical application, and give the improved rules of security label comparison

    本文首先介紹了開發b1級安全數據庫的安全模型及其關鍵技術,著重描述了自主和強制訪問控制的模型,然後指出blp模型安全級的比較在實際應用中的不足,給出改進的安全級比較規則。
  15. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體化,通過研究發現該模型採用強制性安全策略,不易做到靈活的安全控制,因此添加自主存取控制機制的安全策略對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式數據庫自主與強制性)安全機制。基於實體化規則原理,設計了一個採用ddm安全機制的數據庫控制器? ? dds ( distributeddatabasesecure ,分散式數據庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分散式數據庫安全控制。
  16. This thesis researchs the correlative security evaluation criteria and analyses in detail linux kernel at first. linux kernel is improved at four aspects : access control list, capability, system audit, mandatory access control, based on linux kernel 2. 4. 4 on tcsec and the security level of linux is enhanced from cl to bl

    本論文首先研究了相關的安全評估標準,並對linux內核進行了詳細地分析,然後以tcsec為標準,基於linux內核2 . 4 . 4 ,分別從訪問控製表、權能、系統審計以及強制訪問控制四個方面時linux內核進行了改進,使linux的安個級別從c1級提高到了b1級。
分享友人