RBAC
- 网络基于角色的访问控制(Role-Based Access Control);角色访问控制;基于角色访问控制
RBAC
RBAC
基于角色的访问控制(Role-Based Access Control)
...用,它是安全策略在系统运行中的集中表现。基于角色的访问控制(RBAc)作为一门新型的访问控制技术,成为近年来访问控 …
角色访问控制
角色访问控制(RBAC)引入了Role的概念,目的是为了隔离User(即动作主体,Subject)与Privilege(权限,表示对Resource的一 …
基于角色访问控制
基于角色访问控制(RBAC)模型是目前国际上流行的先进的安全访问控制方法。它通过分配和取消角色来完成用户权限的授予 …
基于角色的访问控制方法
基于角色的访问控制方法(RBAC)的显著的两大特征是:1.由于角色/权限之间的变化比角色/用户关系之间的变化相对要慢得 …
基于角色的访问控制模型
而基于角色的访问控制模型(RBAC),通过引入角色实现了用户与权限的逻辑分离;对于政务外网这种存在大量用户和权限分 …
基于角色的权限控制
系统要求基于角色的权限控制(RBAC)。我的数据库表设计如下:1.用户表(User)2.角色表(Role)
基于角色的访问控制技术
由于基于角色的访问控制技术(RBAC)降低了大型网络应用中安全管理的复杂性和花 费,所以自从出现至今,已经成为高级 …
1
Using fpm actually helps cut down on the number of these files, whether one uses RBAC or not.
无论使用RBAC与否,使用fpm实际上有助于减少这些文件的数量。
2
Through introducing the concept of resource into the traditional RBAC model, a databased-based fine grain RBAC control is implemented.
提出将资源概念引入传统RBAC模型中,实现一种基于数据库的动态细粒度RBAC控制。
3
With RBAC, users with administrative roles on software and hardware components are able to do administrative tasks on all those components.
借助RBAC,用户只要拥有部分软硬件组件的管理权限就能够管理这些组件上的任务。
4
Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.
在有这个命令之前,您需要使用Role-BasedAccessControl(RBAC)来帮助纠正setuid和setgid程序的问题。
5
RBAC is a popular technique used to handle authorization tasks in a multi-user, multi-privilege application.
RBAC是用于在多用户、多特权应用程序中处理授权任务的流行技术。
6
It has quickly been adopted by a large number of software products, and in particular by Relational Database Management Systems (RDBMS).
RBAC很快就被很多软件产品采用,尤其是那些关系数据库管理系统(RelationalDatabaseManagementSystems,RDBMS)。
7
The Fedora Core 8 system (new at the time of this writing) shows how SELinux and RBAC are tightly integrated.
FedoraCore8系统(撰写本文时的最新版本)将展示SELinux与RBAC是如何紧密集成在一起的。
8
Domain RBAC provides fine granular control access over resources for users and requires Enhanced RBAC to be enabled.
DomainRBAC为用户提供了很好的资源访问粒度控制,它要求启用EnhancedRBAC。
9
AIX 7 provides domain support in RBAC for greater security through a more granular administrator authority.
AIX7通过粒度更细的管理员权限在RBAC中提供域支持,以提高安全性。
10
Role Based Access Control (RBAC) has been proposed as an alternative approach to the traditional access control mechanism.
基于角色的访问控制(RBAC)被推荐来代替传统的访问控制模型。
11
Compared with the general RBAC model, this model can dynamically allocate roles based on user attributes.
与普通RBAC模型相比,该模型可以动态根据用户属性分配角色。
12
With the introduction of RBAC, a feasibility of extending administrator roles and responsibilities to non-root users is provided.
随着RBAC的引入,也带来了将管理权限和责任扩展到非root用户的可行性。
13
The concept of RBAC isn't discussed as often as TE and can be confusing because of the way it is integrated with TE.
RBAC的概念并不像TE一样经常讨论,并且由于与TE集成在一起,因此十分容易混淆。
14
This article also introduces the design and implementation of the improved RBAC model in network file service system.
本文最后还介绍了改进型RBAC模型在网络文件服务系统中的设计和实现过程。
15
We require a RBAC model, which can make access control decision based on the context information in a fine-grained, identity- based way.
我们需要一个能够基于上下文进行细粒度访问控制的RBAC模型,即基于对象实例上下文上的访问控制。
16
And it is flexible enough to accommodate a diverse variety of authentication and authorization needs.
并且RBAC拥有足够的灵活性,可以满足身份验证和授权的多样性需求。
17
Domain RBAC introduces four new commands and uses some existing commands to handle domain operations on a system.
DomainRBAC引入了四个新命令并使用一些现有的命令来处理系统上的域操作。
18
Then the thesis makes related presentation on the organization and management of RBAC component library.
同时,对RBAC构件库的组织与管理方式,进行了分析与探讨。
19
Admin privileges can be delegated to normal users in the RBAC model to manage volume groups.
可以通过在RBAC模式下将Admin特权指派给常规用户的方式来管理卷组。
20
We propose a trustworthiness and context based access control model (TC-RBAC) and give a method of evaluating the trustworthiness of users.
本文提出了一种基于信任度和上下文的访问控制模型TC-RBAC,并给出了用户信任度计算方法。
21
In this article, we'll review sudo and then outline how you can migrate to RBAC to improve your organization's administration model.
在本文中,我们将首先检查sudo,然后概述如何迁移到RBAC来改进组织的管理模型。
22
You generally think of RBAC as specifying the access that users in certain roles may receive.
一般情况下,可以将RBAC视为指定某些角色下的用户接收的访问。
23
This paper intro- duces RBAC model and analyses access control model in grid environments.
首先介绍了RBAC模型,分析网格中基于RBAC访问控制的模型。
24
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
25
RBAC is access control mechanism which can satisfy more security de- mand of system.
RBAC是一种能够满足系统多方面安全需求的访问控制机制。
26
Based on the analysis and research on above-mentioned background, we design and realize one semantic XML access control model based on RBAC.
在对现有的模型分析和研究的基础上,提出了一种基于角色的语义相关XML的安全模型。
27
In RBAC, administrators manually assign users to roles based on criteria specified by the enterprise.
RBAC模型中的用户-角色关系的分配工作依赖于管理员的手工操作。
28
Domain RBAC allows creating 1024 domain object's on the system.
DomainRBAC在系统上最多可创建1024个域对象。
29
On the basis of core-RBAC model, roles set and permissions set are fractionized.
文中在核心RBAC基本模型的基础上,将角色集和权限集进行细分。
30
Domains are introduced on top of RBAC to eliminate this limitation.
因此,我们在RBAC之上引入了域的概念来消除这种局限。