网站首页  词典首页

请输入您要查询的英文单词:

 

单词 RBAC
释义

RBAC

  • 网络基于角色的访问控制(Role-Based Access Control);角色访问控制;基于角色访问控制
1.
基于角色的访问控制(Role-Based Access Control)
...用,它是安全策略在系统运行中的集中表现。基于角色的访问控制(RBAc)作为一门新型的访问控制技术,成为近年来访问控 …
www.qikan.com.cn
2.
角色访问控制
角色访问控制RBAC)引入了Role的概念,目的是为了隔离User(即动作主体,Subject)与Privilege(权限,表示对Resource的一 …
wmlcet.blog.163.com
3.
基于角色访问控制
  基于角色访问控制RBAC)模型是目前国际上流行的先进的安全访问控制方法。它通过分配和取消角色来完成用户权限的授予 …
www.blogjava.net
4.
基于角色的访问控制方法
基于角色的访问控制方法RBAC)的显著的两大特征是:1.由于角色/权限之间的变化比角色/用户关系之间的变化相对要慢得 …
wmlcet.blog.163.com
5.
基于角色的访问控制模型
基于角色的访问控制模型RBAC),通过引入角色实现了用户与权限的逻辑分离;对于政务外网这种存在大量用户和权限分 …
www.bob123.com
6.
基于角色的权限控制
系统要求基于角色的权限控制RBAC)。我的数据库表设计如下:1.用户表(User)2.角色表(Role)
www.itpub.net
7.
基于角色的访问控制技术
由于基于角色的访问控制技术RBAC)降低了大型网络应用中安全管理的复杂性和花 费,所以自从出现至今,已经成为高级 …
www.docin.com

例句

释义:
1.
Using fpm actually helps cut down on the number of these files, whether one uses RBAC or not.
无论使用RBAC与否,使用fpm实际上有助于减少这些文件的数量。
www.ibm.com
2.
Through introducing the concept of resource into the traditional RBAC model, a databased-based fine grain RBAC control is implemented.
提出将资源概念引入传统RBAC模型中,实现一种基于数据库的动态细粒度RBAC控制。
www.fabiao.net
3.
With RBAC, users with administrative roles on software and hardware components are able to do administrative tasks on all those components.
借助RBAC,用户只要拥有部分软硬件组件的管理权限就能够管理这些组件上的任务。
www.ibm.com
4.
Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.
在有这个命令之前,您需要使用Role-BasedAccessControl(RBAC)来帮助纠正setuid和setgid程序的问题。
www.ibm.com
5.
RBAC is a popular technique used to handle authorization tasks in a multi-user, multi-privilege application.
RBAC是用于在多用户、多特权应用程序中处理授权任务的流行技术。
www.ibm.com
6.
It has quickly been adopted by a large number of software products, and in particular by Relational Database Management Systems (RDBMS).
RBAC很快就被很多软件产品采用,尤其是那些关系数据库管理系统(RelationalDatabaseManagementSystems,RDBMS)。
www.ibm.com
7.
The Fedora Core 8 system (new at the time of this writing) shows how SELinux and RBAC are tightly integrated.
FedoraCore8系统(撰写本文时的最新版本)将展示SELinux与RBAC是如何紧密集成在一起的。
www.ibm.com
8.
Domain RBAC provides fine granular control access over resources for users and requires Enhanced RBAC to be enabled.
DomainRBAC为用户提供了很好的资源访问粒度控制,它要求启用EnhancedRBAC。
www.ibm.com
9.
AIX 7 provides domain support in RBAC for greater security through a more granular administrator authority.
AIX7通过粒度更细的管理员权限在RBAC中提供域支持,以提高安全性。
www.ibm.com
10.
Role Based Access Control (RBAC) has been proposed as an alternative approach to the traditional access control mechanism.
基于角色的访问控制(RBAC)被推荐来代替传统的访问控制模型。
www.ceps.com.tw
1.
Compared with the general RBAC model, this model can dynamically allocate roles based on user attributes.
与普通RBAC模型相比,该模型可以动态根据用户属性分配角色。
lib.cqvip.com
2.
With the introduction of RBAC, a feasibility of extending administrator roles and responsibilities to non-root users is provided.
随着RBAC的引入,也带来了将管理权限和责任扩展到非root用户的可行性。
www.ibm.com
3.
The concept of RBAC isn't discussed as often as TE and can be confusing because of the way it is integrated with TE.
RBAC的概念并不像TE一样经常讨论,并且由于与TE集成在一起,因此十分容易混淆。
www.ibm.com
4.
This article also introduces the design and implementation of the improved RBAC model in network file service system.
本文最后还介绍了改进型RBAC模型在网络文件服务系统中的设计和实现过程。
www.fabiao.net
5.
We require a RBAC model, which can make access control decision based on the context information in a fine-grained, identity- based way.
我们需要一个能够基于上下文进行细粒度访问控制的RBAC模型,即基于对象实例上下文上的访问控制。
www.ceps.com.tw
6.
And it is flexible enough to accommodate a diverse variety of authentication and authorization needs.
并且RBAC拥有足够的灵活性,可以满足身份验证和授权的多样性需求。
www.ibm.com
7.
Domain RBAC introduces four new commands and uses some existing commands to handle domain operations on a system.
DomainRBAC引入了四个新命令并使用一些现有的命令来处理系统上的域操作。
www.ibm.com
8.
Then the thesis makes related presentation on the organization and management of RBAC component library.
同时,对RBAC构件库的组织与管理方式,进行了分析与探讨。
www.fabiao.net
9.
Admin privileges can be delegated to normal users in the RBAC model to manage volume groups.
可以通过在RBAC模式下将Admin特权指派给常规用户的方式来管理卷组。
www.ibm.com
10.
We propose a trustworthiness and context based access control model (TC-RBAC) and give a method of evaluating the trustworthiness of users.
本文提出了一种基于信任度和上下文的访问控制模型TC-RBAC,并给出了用户信任度计算方法。
journal.ecust.edu.cn
1.
In this article, we'll review sudo and then outline how you can migrate to RBAC to improve your organization's administration model.
在本文中,我们将首先检查sudo,然后概述如何迁移到RBAC来改进组织的管理模型。
www.ibm.com
2.
You generally think of RBAC as specifying the access that users in certain roles may receive.
一般情况下,可以将RBAC视为指定某些角色下的用户接收的访问。
www.ibm.com
3.
This paper intro- duces RBAC model and analyses access control model in grid environments.
首先介绍了RBAC模型,分析网格中基于RBAC访问控制的模型。
kns50.chkd.cnki.net
4.
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
www.ibm.com
5.
RBAC is access control mechanism which can satisfy more security de- mand of system.
RBAC是一种能够满足系统多方面安全需求的访问控制机制。
dictsearch.appspot.com
6.
Based on the analysis and research on above-mentioned background, we design and realize one semantic XML access control model based on RBAC.
在对现有的模型分析和研究的基础上,提出了一种基于角色的语义相关XML的安全模型。
www.fabiao.net
7.
In RBAC, administrators manually assign users to roles based on criteria specified by the enterprise.
RBAC模型中的用户-角色关系的分配工作依赖于管理员的手工操作。
www.boshuo.net
8.
Domain RBAC allows creating 1024 domain object's on the system.
DomainRBAC在系统上最多可创建1024个域对象。
www.ibm.com
9.
On the basis of core-RBAC model, roles set and permissions set are fractionized.
文中在核心RBAC基本模型的基础上,将角色集和权限集进行细分。
www.dictall.com
10.
Domains are introduced on top of RBAC to eliminate this limitation.
因此,我们在RBAC之上引入了域的概念来消除这种局限。
www.ibm.com
1.
In RBAC, permissions are provided based on roles that are granted by the security system.
在RBAC中,权限是根据安全系统所授予的角色来提供的。
www.ibm.com
2.
Usually the discusses on restriction of role-based access control (RBAC) models were based on theirs non-time property.
以往对于RBAC访问控制模型的约束的讨论多是基于非时间特性的。
www.ceps.com.tw
3.
The principle of RBAC is discussed. Based on the basic PMI model, the privilege model based on attribute is established.
本文讨论了基于角色的访问控制的基本原理,在基本PMI模型的基础上,建立了基于角色的特权模型。
www.ceps.com.tw
4.
The central notion of RBAC is that users do not have discretionary access to enterprise objects.
RBAC的中心思想是,用户没有对企业对象的自主访问权。
www.ibm.com
5.
Domain RBAC is enabled by default on enhanced RBAC mode system.
DomainRBAC在加强的RBAC模式下是默认启用的。
www.ibm.com
6.
Role-Based Access Control has most important influence among all access control models.
而基于角色的访问控制(RBAC)是最具影响的高级访问控制模型。
kns50.chkd.cnki.net
7.
In AIX 6. 1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
在AIX6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
www.ibm.com
8.
And, the expanded RBAC model-ERBAC model and the formal description are given.
给出了扩展的RBAC模型—ERBAC模型,并给出了其形式化描述。
www.fabiao.net
9.
The improved RBAC model is put forward in organization model and it can make up the deficiency on small granular information control.
在组织模型中对RBAC模型进行改进,解决其在细粒度权限控制上的不足。
cnki.gzlib.gov.cn
10.
On the basis of RBAC model, this paper put forward a new model PRBAC, which was a two-level model based on the post and role.
在RBAC模型的基础上,提出一种基于岗位和角色的两级访问控制模型-PRBAC。
www.ceps.com.tw
1.
WPARs also work very well with Role-Based Access Control (RBAC), which is another important innovation in AIX 6. 1.
WPAR还可以和AIX6.1中的另一个重要创新——基于角色的访问控制(RBAC)——进行很好地协作。
www.ibm.com
2.
Role representation and contradiction redundancy treatment of RBAC-based information grid
基于RBAC的信息网格角色表示及矛盾冗余处理
service.ilib.cn
3.
Application of RBAC in Web-based Platform of Management Information for Bearing Manufacturing Enterprise
在基于Web的轴承制造企业信息化平台中的应用
www.ilib.cn
4.
An Operating System Oriented RBAC Model and Its Implementation
一个应用于操作系统的RBAC模型及其实施
www.ilib.cn
5.
Design and implementation of RBAC-authorized digital certificate
RBAC授权数字证书的设计与实现
service.ilib.cn
6.
Deal Secure Interaction between Administrative Domains with RBAC
利用RBAC实现各个管理域间的安全互访
www.ilib.cn
7.
Application of RBAC in Resource Management System of the Power Energy Monitoring Network
RBAC在电力监控网络资源管理系统中的应用
www.ilib.cn
8.
Encapsulation and Distributed Management of the Role Ranges in RBAC
RBAC角色区间的封装和分布式管理
service.ilib.cn
9.
A RBAC Based and Policy Enforcement Coordination Model in Open Distributed System
开放分布系统中基于RBAC和策略实施的协调模型
www.ilib.cn
10.
The Access Control Policy Study of E-government Information Resource Based on RBAC
基于RBAC的电子政务信息资源访问控制策略研究
www.cnki.com.cn
1.
Application of RBAC in the Railway Passenger Ticket Network Security System
RBAC在铁路客票网络安全系统中的应用
ilib.cn
2.
Analysis and application of the proposed standard for RBAC
一种RBAC建议标准的分析与应用
www.ilib.cn
3.
A workflow access control base on task-status oriented RBAC algorithm in document flow
面向任务、状态的RBAC访问控制机制在公文流转中的应用
www.ilib.cn
4.
Extensible constraint in XML representation of RBAC
可扩展约束的基于角色访问控制策略的XML表示
www.ilib.cn
5.
Implementing Fine Grain RBAC Model in Large Scale Information System
利用细化RBAC模型实现大型信息系统的安全访问控制
www.ilib.cn
6.
Design and implementation of RBAC based model of object hierarchy
基于分层对象化RBAC的设计与实现
www.ilib.cn
7.
Research on Private Privilege in Hierarchical RBAC
RBAC角色继承关系中私有权限问题的研究
www.ilib.cn
8.
RBAC-based design of user aspect-orientation of security systems
基于RBAC设计安全系统的面向方面
www.ilib.cn
9.
Now that the users exist, set up RBAC to log them into the appropriate roles
现在用户已经存在,请设置RBAC以将这些用户登录到相应的角色中
www.ibm.com
10.
Digital Watermark Based Database Model Using RBAC
基于数字水印的数据库角色访问控制模型
www.ilib.cn
1.
Research for Inheritance and Mutual Exclusion of Role in RBAC Model
RBAC模型中角色的继承与互斥问题的研究
ilib.cn
2.
Improvement and application of access control on RBAC
基于角色的权限管理方法的改进与应用
www.ilib.cn
3.
Applicable Model of RBAC in OA Management Document System
办公文档管理系统权限管理的应用模式
www.ilib.cn
4.
Analysis on Definition and Realization Models of SoD in RBAC
RBAC职责分割定义及实现模型分析
www.wanfangdata.com.cn
5.
Design and Implementation A Model of Privilege Management Infrastructure Based on RBAC
基于RBAC模型的权限管理系统设计与实现
ilib.cn
6.
Role Permission in Hierarchy Relation of RBAC Model
RBAC模型层次关系中的角色权限
www.ilib.cn
7.
Distributed cooperation environment access control based on RBAC
基于RBAC的分布式协同环境下的访问控制策略
ilib.cn
8.
Study on RBAC Extention- Based Grid Access Control
基于RBAC扩展的网格访问控制的研究
www.ilib.cn
9.
Analysis and Design of RBAC Dynamic Decision Model
RBAC动态判决模型的分析与设计
www.ilib.cn
10.
Research and Application of Parameterized RBAC in On-line Applying System
参数化RBAC在网上申报系统中的研究与应用
www.ilib.cn
1.
A Realization of Controlling the Access to a Net Database Based on RBAC
基于RBAC的网络数据库访问控制
service.ilib.cn
2.
Design and realization for model of user authorization administration based on RBAC
基于RBAC的用户授权管理模型的设计与实现
ilib.cn
3.
A Role Grant Noncascade Removing Algorithm of the RBAC of RDBMSs
一种关系数据库系统角色授权非级连撤消算法
www.ilib.cn
4.
Research on Access Control of Digital Television Management System Based on RBAC Model
基于RBAC模型的数字电视管理系统的访问控制研究
ilib.cn
5.
Implementation Technique Based on RBAC Used in Web
基于角色的访问控制在Web中的实现技术
www.wanfangdata.com.cn
6.
Research of establishing network RBAC based on MLS and attribute certificate
基于多级安全和属性证书实施网络基于角色访问控制策略
ilib.cn
7.
A Design Study for Conditional Temporal in RBAC
RBAC模型中条件时态的研究与设计
www.ilib.cn
8.
Research on Type of Role Inheritance in RBAC Model
关于RBAC模型中角色继承类型的研究
www.ilib.cn
9.
A RBAC Model in Workflow Management System
一种工作流管理系统中的访问控制模型
ilib.cn
10.
Grid secure access control model bared on RBAC
基于RBAC策略的网格安全访问控制模型
www.ilib.cn
1.
P-RBAC: access control model in portal systems
一种门户环境下的访问控制模型
www.ilib.cn
2.
Study on RBAC's application in campus network
校园网角色访问控制应用研究
www.ilib.cn
3.
The privilege control of the users role hierarchies based on RBAC
基于RBAC中用户角色继承的权限控制方式
www.ilib.cn
4.
Search and Design of RBAC Model in LDAP Service
基于角色的访问控制模型在LDAP服务中的研究与设计
www.ilib.cn
5.
A Method of Implementing Dynamic User- Privilege Management Based on RBAC
一种基于RBAC的实现动态权限管理的方法
ilib.cn
6.
Research on Unified Privilege Management System Based on RBAC
基于RBAC的统一权限管理系统研究
www.ilib.cn
7.
Two Level Access Control Model of Distributed Services Based on RBAC
基于RBAC的分布式服务两级访问控制
www.ilib.cn
8.
Security Strategy based on RBAC in Hospital Information System
基于RBAC的医院信息系统的安全性策略
www.ilib.cn
9.
Multilevel Document Access Control Model Based on RBAC
基于角色的多级文档安全访问控制模型设计
www.ilib.cn
10.
Design and realization in E-government system based on RBAC theory
基于RBAC的电子政务权限访问控制模块的设计与实现
www.ilib.cn
1.
Data Security Design of Power System Based on Improved RBAC Model
基于RBAC改进模型的电力系统数据安全设计
www.ilib.cn
2.
Research on Access Control Model Based on RBAC for Grid Computing
网格计算中基于RBAC的访问控制模型的研究
www.ilib.cn
3.
The authority control to administrator based on RBAC
RBAC模型中对超级用户的权限约束
www.ilib.cn
4.
Workflow Authorization Model Based on RBAC
一个基于RBAC的工作流授权模型
www.ilib.cn
5.
The Method of Small-Granularity for Access Control Based on RBAC and LDAP
基于角色和目录服务的细粒度访问控制方法
ilib.cn
6.
The Study and Implement of RBAC in Enterprise Information System
基于角色的安全访问控制在企业信息系统中的应用研究
www.ilib.cn
7.
Access Control Model Based on RBAC for Semantic XML
基于角色的语义相关XML访问控制模型
www.ilib.cn
8.
Research on RBAC Based on Attribute and Policy
基于属性证书和策略的RBAC应用研究
ilib.cn
9.
Implementation of OA System Based on RBAC
基于角色访问控制的OA系统的实现
www.ilib.cn
10.
Realization of Mutil-Level Module Access Control Based on RBAC
基于RBAC的多级模块访问控制的实现
service.ilib.cn
1.
The security model of CSCW system based on RBAC
基于角色的CSCW系统安全模型
ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/12/26 3:01:24