authorization role 中文意思是什麼

authorization role 解釋
授權角色
  • authorization : n. 1. 授權,委任。2. 認可,核準。
  • role : n. 1. (演員扮演的)角色。2. 任務;作用。
  1. Authorization for a user or a role is managed using the

    用戶或角色的授權通過使用
  2. Through role - based security, reporting services provides an authorization model, but it does not include an authentication component

    通過基於角色的安全性, reporting services提供了一種授權模型,但它並不包含身份驗證組件。
  3. Security is another major area of change with the transition from the websphere security authorization model to role - based security

    安全性是更改的另一個主要方面,它體現在從websphere安全性授權模型到基於角色安全性的轉變中。
  4. Provides an overview of the authorization process used in. net framework role - based security

    提供關于. net framework基於角色的安全性中使用的授權過程的概述。
  5. By the role number of role authorization table, certification server can use different security - class identification technologies according to diverse users dynamically, and decides responding authorization with the identification results

    通過角色授權表中的角色數字,認證服務器能夠對不同用戶動態地採用不同安全級別的認證技術,並能根據認證結果做出授權判斷。
  6. On the basis of the above resolution, the paper constructs user - role mapping table and role authorization table

    根據以上內容,本文建立了用戶?角色映射表和角色授權表。
  7. Mapping table of user and role is established through their relevance, and authorizing table of role and table is obtained in terms of map relevance among role, database, database table. by the role ' s flag number, certification server dynamically applies different secure identification technique to give identification to users, and gives authorization decision according to result of identification. the method realizes authorization through program, and is not dependent on concrete database

    根據用戶與角色的映射關聯來獲得用戶和角色的映射表,根據角色、數據庫和數據庫表映射關聯來獲得角色和數據庫表的授權表,通過角色的標識數字,認證服務器動態採用不同安全級別的認證技術對用戶進行認證,並能根據認證結果作出授權判斷,這種方法使用應用程序來實現授權而不需依賴于具體數據庫。
  8. A temporal role - based administration of authorization model

    一種具有時間約束的基於角色的授權管理模型
  9. A cas credential includes authorization assertions that describe the user s role in a community and can be used by end resources to grant access accordingly

    Cas證書包括了授權聲明,其中描述了用戶在社區中的角色,終端資源也可以使用它來進行相應的訪問授權。
  10. The thesis emphasize further research on both identity identification and authorization access based on role access control. a new identity identification protocol and a new method of access authorization are presented

    論文著重對身份認證和基於角色的存取控制授權訪問進行了深入研究,並提出新的身份認證協議和訪問授權方法。
  11. The traditional model of data access superiority management is introduced, points out that the static data access superiority management based on role is not integrated in a workflow management system, brings forward s new model of data access superiority management based on workflow, and describe its static authorization mechanism based on role

    摘要介紹了傳統的訪問控制,指出了靜態的基於角色的訪問控制在工作流管理系統中不能被直接套用,基於工作流的訪問控制應採用靜態授權和動態控制相結合的方式來解決,提出了其基於角色的靜態授權機制,靜態授權機制將基於角色的訪問控制與工作流狀態變化有機地聯系起來,在此基礎上可以方便地實現工作流管理系統中的訪問控制。
  12. Through researching on various access control mechanisms, an authorization management approach is introduced which combine discretionary access control with role - based access control

    通過對各種訪問控制機制的研究,提出了採用自主訪問控制與基於角色的訪問控制相結合的方法對企業電子文檔的權限進行管理。
  13. This is done in se linux by requiring that the " login " program, which has an associated authorization process, handle transitions to the administrator role and domain - which one can only hope actually works

    現在對開放源碼技術的支持和使用確保了最終從專有操作系統的轉移將順利進行並且影響很小。而這不正是我們所做工作的意義嗎?
  14. Based on the fourth version of x. 509 standard and rfc3281 document, the basic idea of pki and pmi as well as x. 509 attribute certificate are explained. in the second part, attribute certificate authorization mechanism of pmi is investigated using an example, including the modification of pmi role model, the asn. 1 syntax definition of role specification certificate and role assignment certificate, the flow design and analysis of attribute certificate authorization mechanism and the validation verification of certificate chain

    其中包括了對pmi角色模型的改進、角色規范證書和角色分配證書的asn . 1語法結構定義、證書的授權流程設計與分析以及屬性證書鏈的有效性驗證等;最後,本文根據證書機制授權流程設計了一個簡單的pmi特權處理模型,並對其中的模型組件、系統運作過程和設計中考慮到的若干技術細節分別予以了有益的探討。
  15. Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization

    第三,在深入研究多級安全模型、完整性模型、基於角色的授權模型等基礎上,首先提出了一個修改blp模型( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp模型、 clark - wilson模型、 dte模型、 rbac模型有機地集成應用,提升出一個支持機密性、完整性和授權等多安全策略的,可實現動態授權的訪問控制模型( daacm ) 。
分享友人