role-based 中文意思是什麼

role-based 解釋
基於角色
  • role : n. 1. (演員扮演的)角色。2. 任務;作用。
  • based : 基準
  1. Implement role - based access to the cws ( or other clinical database )

    從功能角色方面進入cws (或者其他的臨床數據庫) 。
  2. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。
  3. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  4. One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority

    摘要基於角色訪問控制( rbac )技術的一個重要概念就是角色,通過在用戶和訪問權限之間增加一個角色層,使得權限控制更為簡單且靈活有效。
  5. Because cooperative learning which is carried out in groups has its specific feature different from traditional teaching, some aspects such as class " management and organization, coordinating group activities, dealing with relationships among class, group and students, play important part in cooperative learning. this paper also goes further into the problem of teachers " role. based on this, it puts forwards its own views and propositions about the relationship between cooperative learning and other kinds of learning styles, just as a reference for future teaching practice

    由於合作學習課堂具有以小組學習的順利進行來達成教學目標這一有別于傳統教學的特點,因此對課堂的組織與管理,協調各個小組的學習活動,處理好全班? ?小組? ?學生個體之間的關系就顯得尤為重要,為此本文還對教師的角色問題作進一步的探討,在此基礎上本文對課堂合作學習與其它學習方式的關系等問題也提出了自己的見解和主張。
  6. Upon the implementation of tx - defendingl. o, the author puts forward an idea of expressing network security policy in a formal logic language. the language discussed here is role - based standard deontic logic. this language can not only detect policy consistency, but also resolve policy conflicts

    最後,本文對用於主動防火墻各安全成員之間交互信息的安全策略進行了討論,在理論上提出了一種可以自動檢測策略一致性以及自動解決策略沖突的網路安全策略語言一基於角色的sdl 。
  7. For this, the paper combines some thoughts such as role, agent, and service. it also proposes the developing framework of a role - based collaborative software with the object - oriented model technology and imitatively realizes the interacting and cooperating process of the members in developing activities. firstly, to overcome the difficulty of members ’ fuzzy realism to roles, this paper organizes supplying and requiring servvice set, bridges the reflecting relationship between roles and services and realizes the clear definition and dynamic transformation of roles through modifying service set and service - role registered table

    為此本文結合角色、 agent 、服務等思想,利用面向對象建模技術提出一種基於角色的協同軟體開發框架,主要工作有:首先針對成員在開發過程中對角色認識模糊的困難,本文為角色組織了供給和需求兩組服務,建立了角色與服務之間的映射關系,通過修改服務集和服務-角色登記表,實現了角色的清晰定義和動態修改,與傳統方法相比,清晰角色有利於成員明確自身所承擔的職責和擁有的權限;同時為簡易成員查找角色的復雜過程,提出一種靈活的角色查找方法,利用角色匹配矩陣和角色推薦演算法,匹配出符合成員要求的一組近似角色,降低了角色查找的難度。
  8. Although you can use any intellectual work or analysis you may have already done for other role - based applications in use at your organization, you cannot import the security constructs into reporting services

    雖然可以使用可能已在單位內的其他基於角色的應用程序中完成的信息管理和分析任務,但無法將安全結構導入reporting services中。
  9. Windows server 2003 sp1 enhances security infrastructure by providing new security tools such as security configuration wizard, which helps secure your server for role - based operations, improves defense - in - depth with data execution protection, and provides a safe and secure first - boot scenario with post - setup security update wizard

    Windows server 2003 sp1通過提供諸如安全配置向導之類的新安全工具增強了安全基礎結構,它有助於確保服務器的基於角色的操作的安全、通過數據執行保護提高縱深防禦能力並通過后安裝安全更新向導提供安全可靠的第一次引導方案。
  10. To overcome the shortcoming of cooperation graph, a role based cooperation graph ( rcg ) is presented and the variable elimination algorithm to compute combined action in cooperation graph is improved

    為此,本文提出基於角色的協作圖,並對協作圖中用來計算聯合動作的變量消減演算法加以改進。
  11. Evaluating judges ' role based on the candidates ' score

    用受評者的得分給評委們評分
  12. Through role - based security, reporting services provides an authorization model, but it does not include an authentication component

    通過基於角色的安全性, reporting services提供了一種授權模型,但它並不包含身份驗證組件。
  13. Security is another major area of change with the transition from the websphere security authorization model to role - based security

    安全性是更改的另一個主要方面,它體現在從websphere安全性授權模型到基於角色安全性的轉變中。
  14. Provides an overview of the authorization process used in. net framework role - based security

    提供關于. net framework基於角色的安全性中使用的授權過程的概述。
  15. 2. adopts the ca authentication mode, and combines the user certificate and role based access control, which enhances authentication and simplifies the way of access control

    採用了基於ca證書的身份認證方式,並將用戶證書和角色授權機制結合起來,既嚴格了身份認證又簡化了權限管理。
  16. The dissertation is dedicated to role - based access control ( rbac ) technology and its application in court case management information system

    本論文研究基於角色的訪問控制技術及其在法院系統中的應用。
  17. In the second part the paper has studied the general situation and problems of lands transfer both in the whole country and in zhejiang province, described the land transfer behavior of peasant households, and made conclusions as follow. behavior of land transfer is highly connected with economic development. government should play a guiding and service role based on wills of peasants

    第二部分介紹全國及浙江省農地流轉的總體情況及存在的問題,概述農戶家庭農地流轉行為,並得出相關結論:農地流轉行為與經濟發展程度密切相關;政府在農地流轉中應遵循農民自願的原則,承擔起引導和服務的作用;農戶家庭農地流轉所遵循的原則依然是經濟理性原則,提高農地利用效率是農戶進行農地流轉行為的根本動機。
  18. Applying digital certificate to implement the role - based access control

    大中型繞線式異步電機的靜止進相器
  19. With the tectonic uplift of the source area and the climate turning dry, the coal forming period was over, the fluvial system and fluvial - delta system became to play a major role. based on the study of former researchers and the theory of deep basin gas reservoir forming, the deep basin gas trap in the ordos basin is analyzed and is supposed to form in the ramp of the basin. it is supposed that the hydrocarbon of the deep basin gas trap is mainly composed of coal, carbonate and carbonaceous shale and with the " upper water seal " in the north of the study area the g

    根據深盆氣成藏理論和前人的研究成果,分析了深盆氣藏的分佈類型,認為鄂爾多斯盆地深盆氣藏屬于盆地斜坡成藏類型;認為深盆氣的源巖以煤、炭質泥巖、暗色泥巖和碳酸鹽巖為主;北部氣水倒置、東部露頭區有天然氣逸出;氣藏具有多重壓力系統;成藏機理主要是氣體動態的運移與聚集,穩定的構造背景有利於氣藏的大面積保存。
  20. In this technique, to control the users ' accesses, the role - based access control ( rbac ) and the mandatory access control ( mac ) were integrated to construct access matrix

    在該顯示技術中,結合角色的訪問控制與強制的訪問控制,建立訪問矩陣對用戶進行訪問控制。
分享友人