查电话号码 繁體版 English Francais日本語Русский ไทย
登录 注册

discretionary access control造句

"discretionary access control"是什么意思  
造句与例句手机版
  • In discretionary access control lists dacls are removed
    的任何审核ace将被移除。
  • Discretionary access control
    任意访问控制
  • Presents platform sdk recommendations about privileges , buffer overruns , discretionary access control lists dacls , and passwords
    介绍有关的platform sdk建议,包括特权、缓冲区溢出、任意访问控制列表( dacl )和密码。
  • The mixed access control of this model that combines mandatory access control with discretionary access control is described in detail
    详细讨论了模型的混合访问控制方法,即强制访问控制与uosd访问矩阵相结合的方法。
  • Discretionary access control ( dac ) is one of necessary and most common secure mechanisms in the secure operating system
    自主访问控制机制( discretionaryaccesscontrol )是安全操作系统必不可少的、应用最广泛的安全机制之一。
  • Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage , dac would lead to access transfer and mac is lack of access mechanism in same level
    传统的自主访问控制dac和强制访问控制mac都各自的缺点, dac会出现访问传递问题,而mac在同级间缺乏控制机制。
  • The model is also applicable for xml schema documents . a flexible and practical method to enforce discretionary access control ( dac ) policy on xml documents is presented in this paper
    2 )提出了一种灵活实用的方法对xml文档实施自主访问控制策略,该方法基于功能强大的xml模式而不是传统的dtd技术。
  • Through researching on various access control mechanisms , an authorization management approach is introduced which combine discretionary access control with role - based access control
    通过对各种访问控制机制的研究,提出了采用自主访问控制与基于角色的访问控制相结合的方法对企业电子文档的权限进行管理。
  • This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ) , mandatory access control ( mac ) and least privilege management . finest granularity dac allows that the owner of an object can choose to grant access permission to any other user
    本论文主要在文件访问控制和特权管理这两方面对linux的安全性进行增强,即实现了细粒度的自主访问控制、强制访问控制、以及最小特权管理。
  • Nevertheless , some traditional approaches , such as discretionary access control and mandatory access control , are not suitable for systems where more sophisticated access control is needed . as a result , rbac has become a hotspot in research community in recent years
    然而,传统的访问控制技术? ?自主型访问控制和强制型访问控制,远远落后于当代系统安全的需求,基于角色的访问控制( role - basedaccesscontrol ,简称rbac )作为一种新型的访问控制技术成为了近年来相关领域研究的热点。
  • It's difficult to see discretionary access control in a sentence. 用discretionary access control造句挺难的
  • The paper first analyzes today ’ s three main access control technologies ? discretionary access control ( dac ) , mandatory access control ( mac ) and role - based access control ( rbac ) , and then points out that the traditional dac and mac are unable to satisfy the enterprise ’ s demand for the unified resource access control . however , although rbac has many merits , it is essentially still a subject - based static authorization model , and lacks the enough flexibility , dynamic characteristics and scalability and cannot satisfy the enterprise ’ s demand for the unified resource access control completely . based on the analytical research for rbac ’ s improved models , the paper proposes the role and context - based access control ( rcbac ) model
    本文首先分析了当前三种主要的访问控制技术? ?自主访问控制( discretionaryaccesscontrol , dac ) 、强制访问控制( mandatoryaccesscontrol , mac )和基于角色的访问控制( role - basedaccesscontrol , rbac ) ,认为传统的dac和mac无法满足企业统一资源访问控制的需求,而rbac尽管有很多的优点,但它本质上仍然是以主体为中心的、静态的授权模型,缺乏足够的灵活性、动态性和伸缩性,并不能完全满足企业统一资源访问控制的需求。
  • In the beginning of the thesis , we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control . then we indicate the deficiency of the comparison of the security label in the practical application , and give the improved rules of security label comparison
    本文首先介绍了开发b1级安全数据库的安全模型及其关键技术,着重描述了自主和强制访问控制的模型,然后指出blp模型安全级的比较在实际应用中的不足,给出改进的安全级比较规则。
  • We characterized the security issues in asp - based networked manufacturing system , especially the issue of the user access control . then the typical methods of access control were introduced , which include discretionary access control ( dac ) , mandatory access control ( mac ) , role - based access control ( rbac ) , task - based access control ( tbac ) , coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on . based on that , we provided an integrated user access control model , which was composed of rbac , tbac , rdac and cbac
    本章描述了asp和网络化制造系统的安全性问题,尤其是用户访问控制的问题;接着介绍了几种浙江大学博士学位论文典型的访问控制方法,包括强制访问控制、任意访问控制、基于角色的访问控制、基于任务的访问控制,以及基于公司关系的访问控制、基于企业联盟的访问控制等;在前面描述的典型访问控制模型基础上,给出了一个网络化制造系统的综合访问控制模型,包括网络化制造系统的用户和资源层次关系图、访问控制参考模型和访问控制过程模型,并定义了各个模型中的相关元素和关系,给出了各级约束验证和授权的表达;最后我们给出了以xacml为基础的网络化制造系统的访问控制描述语言。
  • Several approaches are provided to construct secure operating systems . the paper mainly discusses diverse security policies in operating systems . by the gfac framework , we implement several security policies in linux kernel version 2 . 2 . 14 , including hru model based fine grain discretionary access control , multi - level security policy based mandatory access control and biba model based integrity access control
    文章重点研究了如何在操作系统中实现多种安全策略,并在linux内核版本2 . 2 . 14中根据访问控制通用框架( gfac )方法,实现了基于hru模型的细粒度自主访问控制、基于bell - lapadula模型多级安全规则的强制访问控制以及基于biba模型的强制访问控制等多种安全策略,从而有效地增强了操作系统中信息的保密性和完整性。
如何用discretionary access control造句,用discretionary access control造句discretionary access control in a sentence, 用discretionary access control造句和discretionary access control的例句由查查汉语词典提供,版权所有违者必究。