mandatory control 中文意思是什麼

mandatory control 解釋
強制性控制
  • mandatory : adj 命令的,訓令的;委任的,委託的 (upon); 〈美國〉強迫的,義務性質的。 mandatory administrati...
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  1. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  2. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  3. The socialist market consciously a pply the law of value and give a play to market mechanism, the macro - control of socialist market economy is shifted from direct management of economic activity mainly by administrative means to indirect one mainly by economic and legislative means, and appropriate system of control is set up. to reform the system of economic plan, we gradually reduce the scope of mandatory planning and expand the guiding planning

    社會主義市場經濟自覺運用價值規律和發揮市場機制的作用,社會主義市場經濟的宏觀調控從主要依靠行政手段、對經濟活動進行直接調控轉到以經濟手段、法律手段為主的間接調控上來,建立起相應的調控體系,改革經濟計劃體制,逐步縮小指令性計劃,擴大指導性計劃。
  4. The mixed access control of this model that combines mandatory access control with discretionary access control is described in detail

    詳細討論了模型的混合訪問控制方法,即強制訪問控制與uosd訪問矩陣相結合的方法。
  5. In this technique, to control the users ' accesses, the role - based access control ( rbac ) and the mandatory access control ( mac ) were integrated to construct access matrix

    在該顯示技術中,結合角色的訪問控制與強制的訪問控制,建立訪問矩陣對用戶進行訪問控制。
  6. Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage, dac would lead to access transfer and mac is lack of access mechanism in same level

    傳統的自主訪問控制dac和強制訪問控制mac都各自的缺點, dac會出現訪問傳遞問題,而mac在同級間缺乏控制機制。
  7. How to enforce mandatory access control ( mac ) policy on xml documents is first proposed

    3 )首次討論了在xml文檔中實施強制訪問控制策略的方法。
  8. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ), mandatory access control ( mac ) and least privilege management. finest granularity dac allows that the owner of an object can choose to grant access permission to any other user

    本論文主要在文件訪問控制和特權管理這兩方面對linux的安全性進行增強,即實現了細粒度的自主訪問控制、強制訪問控制、以及最小特權管理。
  9. Mandatory access control modeling and security analysis : a petri - nets based method

    網的強制訪問控制模型及其安全分析
  10. Mandatory access control

    強制訪問控制
  11. This linux version incorporates a strong, flexible mandatory access control architecture into the kernel

    :這個linux版本將強大、靈活的強制訪問控制體系結構融入內核之中。
  12. This model can assign and manage the security labels of subject and object efficiently, implement mandatory access control between them

    本文研究訪問控制技術,分析傳統嵌入式實時操作系統在安全方面存在的不足。
  13. Put forward a control model which meet the demand of the security protection for spatial database and implement the mandatory access control

    提出了適合於空間數據安全保護需求的控制模型,實現對空間數據的強制安全保護。
  14. Minority shareholders " interest protection should be greatly emphasised in the acquisition by agreement, and the western countries such as the united states successfully set up a lot of rules to achieve that goal, which can benefit us a lot. firstly, before the controlling shareholder decides to sell his control, he has the responsibility to carefully investigate the purchaser in case the company will be looted later, and the controlling shareholder should be liable for his negligence of this. secondly, generally speaking the control premium is owned by the controlling shareholder and can only be shared by other shareholders in relatively restricted situations. finally, mandatory tender offer system enables the minority shareholders to sell their shares at a fair price when there is a sale of control, and this goal can only be achieved by setting strict and sound rules to govern the contents the offer especially in the price and the number of shares to be qcquired

    首先,控股股東出讓其股份時應當承擔適當謹慎的義務來對收購者進行相關的調查,以避免股份受讓者將來對公司進行「掠奪」 ,如果該控股股東未盡到此項義務而造成公司遭受「掠奪」則應當承擔相應的損害賠償責任。然後,公司控制權交易中所產生的「控股溢價」原則上應該歸控股股東所享有,只有在少數情況下才由全體股東共同享有。最後,強制性收購要約制度是在公司控制權發生轉移后所賦予中小股東的退出該公司的機制,但是只有對此項制度進行完整、嚴格的規定才能達到保護中小股東利益的立法目的。
  15. Nevertheless, some traditional approaches, such as discretionary access control and mandatory access control, are not suitable for systems where more sophisticated access control is needed. as a result, rbac has become a hotspot in research community in recent years

    然而,傳統的訪問控制技術? ?自主型訪問控制和強制型訪問控制,遠遠落後于當代系統安全的需求,基於角色的訪問控制( role - basedaccesscontrol ,簡稱rbac )作為一種新型的訪問控制技術成為了近年來相關領域研究的熱點。
  16. Second, improve command and control, as there is a mandatory need for a unified or sole source command

    第二,提高指揮與調度,統一而唯一的指揮是法律要求的。
  17. In the beginning of the thesis, we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control. then we indicate the deficiency of the comparison of the security label in the practical application, and give the improved rules of security label comparison

    本文首先介紹了開發b1級安全數據庫的安全模型及其關鍵技術,著重描述了自主和強制訪問控制的模型,然後指出blp模型安全級的比較在實際應用中的不足,給出改進的安全級比較規則。
  18. Mandatory takeover bid of the listed company means the legal act intending to get control of a corporation by means of acquisition of its shares. takeover and its legal control are both important and complicated

    上市公司收購是一種常見的資產經營方式,通過公司資產的優化配置來提高公司資產的收益,加速公司經營的創新,使公司獲得更大的效益和更廣闊的發展前景。
  19. Agreement was also secured with suppliers that a mandatory control scheme be introduced for common products containing volatile organic compounds, scheduled to come into effect in 2007

    此外,我們並與供應商達成協議,準備在2007年針對多種含揮發性有機化合物的日常用品推行強制性管制計劃。
  20. The epd has negotiated with suppliers and secured their agreement to a mandatory control on the voc content in these products. it is expected the control will come into effect in 2007

    環保署與供應商協商后,已經獲得業界支持對產品中的揮發性有機化合物推行強制性管制計劃,預計管制措施將於2007年推行。
分享友人