rbac 中文意思是什麼

rbac 解釋
基於角色
  1. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  2. One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority

    摘要基於角色訪問控制( rbac )技術的一個重要概念就是角色,通過在用戶和訪問權限之間增加一個角色層,使得權限控制更為簡單且靈活有效。
  3. In this thesis, after analyzing the existed access control technology, we bring forward a rbac security access control and manage model based on ldap and design the security access control for the component datatrans

    論文在分析了現有的訪問控制模型的基礎上,提出了基於ldap的rbac安全訪問控制和安全管理的模型,並對分散式數據傳輸組件datatrans進行安全性訪問控制的擴充設計。
  4. The dissertation is dedicated to role - based access control ( rbac ) technology and its application in court case management information system

    本論文研究基於角色的訪問控制技術及其在法院系統中的應用。
  5. Having thoroughly studied existing rbac models and application approaches, in conjunction with author ' s experience gained in the development of yx - ccmis, the author made a few contributions to rbac techniques : 1

    根據對rbac模型的研究以及玉溪法院系統的開發經驗,本論文的成果可以總結為: 1
  6. The basic idea of rbac is adopted in the development of yuxi court case management information system ( yx - ccmis, for short ), in which the author has been involved ; and the system thus developed has satisfied basic requirements of practical application and been operational since

    作者參加開發的雲南玉溪法院案件管理信息系統(以下簡稱「玉溪法院系統」 )訪問控制的設計採用了rbac的基本思想,達到了預期的目標。
  7. Based on analysis of the classical role - management model - rbac, least - privilege management is implemented in seclinux

    首先分析了角色管理的經典模型rbac ,在此基礎上設計並實現了seclinux的最小特權管理。
  8. In this technique, to control the users ' accesses, the role - based access control ( rbac ) and the mandatory access control ( mac ) were integrated to construct access matrix

    在該顯示技術中,結合角色的訪問控制與強制的訪問控制,建立訪問矩陣對用戶進行訪問控制。
  9. This paper gives an analysis of several aspects which should be considered in controlling entities, and makes a thorough and careful design of entities ' authorized granularity control based on the theory of rbac

    摘要對深入到圖元的細粒度控制進行了研究,分析了圖元授權粒度需要考慮的各個方面,在rbac理論基礎上,對該控製做了全面而細致的設計。
  10. Compared with traditional dac and mac models, role - based access control ( rbac ) model can provide better flexibility and scalability

    基於角色訪問控制模型rbac比傳統的自主訪問控制和強制訪問控制更加優越,提供了更高的靈活性和擴展性。
  11. Does mysql 5. 0 include support for roles based access control ( rbac )

    0是否支持基於角色的權限控制( rbac )呢
  12. In the rbac model, each intended user for a resource is mapped to a role type, which is defined by the resources manager

    Rbac規定每一個資源的潛在用戶均對應於一個資源控制方定義的一個role類型,而控制方為每一個role類型定義其訪問權限。
  13. Refinement and clarification to the core concept of " role " with regard to rbac 2

    進一步廓清了rbac的核心概念? 「角色」的本質。
  14. In this paper, rbac and grbac are analyzed, and the dimension of tasks is associated with generalized role - based access control mechanism, thus permissions are managed according to the context such as the states of environment and requirements of current task

    本文對rbac和grbac進行了分析,將任務維度與grbac訪問控制機制關聯,從而實現相應于環境狀態和當前任務等上下文信息的動態權限管理。
  15. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。
  16. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命令模式的持久層組件,封裝了數據庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的代碼冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問控制的安全子系統則初步實現了數據安全傳輸和權限控制;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
  17. It also supports the custom authorization module through the saml callout, so that the researchers and developers can develop their own authorization schema. based on the rbac and the attribute certificate, a new authorization schema based on the attribute certificate bas been advanced to resolve the shortcoming of the existing authorization schema

    本文針對網格環境對授權和訪問控制的需求以及目前已經存在的網格授權和訪問控制機制的不足之處,在分析了rbac模型和屬性證書的基礎上,設計並實現了基於屬性證書的網格授權機制。
  18. Nevertheless, some traditional approaches, such as discretionary access control and mandatory access control, are not suitable for systems where more sophisticated access control is needed. as a result, rbac has become a hotspot in research community in recent years

    然而,傳統的訪問控制技術? ?自主型訪問控制和強制型訪問控制,遠遠落後于當代系統安全的需求,基於角色的訪問控制( role - basedaccesscontrol ,簡稱rbac )作為一種新型的訪問控制技術成為了近年來相關領域研究的熱點。
  19. However, rbac and grbac are difficult to meet dynamic access control requirements because they are essentially established on the static subject - object view

    然而, rbac和grbac本質上是建立在靜態的主體-客體訪問控制思想之上的,難以滿足動態訪問控制的要求。
  20. The work has improved rbac on the capability of dynamic access control, and can be used for reference by their practical application, especially in distributed environment

    本文的研究工作改善了rbac和grbac的動態訪問控制能力,為rbac和grbac在分散式環境下的應用提供了有用的參考。
分享友人