授权控制

  • 网络authorization;Authorization Control
授权控制授权控制
  1. 其中通过CAS能实现对用户服务的授权控制。

    We can implement the authorization control of serve for the consumers .

  2. 基于角色的访问控制(RBAC)对用户赋予角色,再根据角色的不同分配相应的权限,大大简化了授权控制和安全控制。

    Role based access control ( RBAC ) simplifies authorization access control and security control since the authorization method that it assigns roles to users , and then assigns different privileges to different roles according to the character of the roles .

  3. 必须在每个Web或企业应用程序的部署描述符中定义每个角色,并且必须创建安全约束来保护每个授权控制的资源。

    Each role must be defined in the deployment descriptor of each Web or enterprise application , and security constraints must be created to secure each authorization-controlled resource .

  4. 您可以对每个授权控制的大楼使用单个ACL实现此规则,并授予ACL中的用户和组“进入”权限。

    You can implement this rule with a single ACL on each authorization-controlled building , granting users and groups in the ACL the ENTER permission .

  5. 加强对子公司进行授权控制;

    Strengthen its control over authorization right of its subsidiary companies ;

  6. 电子银行系统、数据库、应用功能间恰当的授权控制。

    Proper authorisation controls within e-banking systems , databases and applications .

  7. 通过授权控制访问共享文件夹。

    Control access to shared folders by using permissions .

  8. 访问标志的概念非常类似于基于标签的授权控制。

    The concept of an access token is very similar to label-based authorization controls .

  9. 完善中国石化内部授权控制的思考

    Thinking on Perfection of Internal Control in Sinopec

  10. 基于任务的授权控制及其实现

    Task - Based Authorization Control and Its Implementation

  11. 基于任务和角色的分布式工作流授权控制模型

    Task & Role-based Distributed Workflow Access Control Model

  12. 信息系统用户授权控制体系研究

    Controlling user authorization architecture of information system

  13. 这两种技术在单点访问系统中实现身份认证和访问授权控制功能。

    The PKI and PMI can provide functions of authentication and authority in the SAS .

  14. 用VC++分别实现了条件接收系统授权控制消息和授权管理消息的整个发送协议。

    Realize all sending protocol of the ECM and EMM using VC + + tools .

  15. 网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。

    The network information security technique commonly includes authentication , authorization , audit , data privacy , data integrity and so on .

  16. 该框架支持分布式成员加入和授权控制以及动态安全策略,本文通过原型系统验证了其可行性。

    The architecture supports distributed member joining control , authorization control and dynamic security policy . A prototype is implemented to validate the architecture .

  17. 数字电视的条件接收系统和用户管理系统是密不可分缺一不可的,通过这两个系统,数字电视运营商才能够对用户进行精确地授权控制和管理,可以说用户管理系统就是条件接收系统的组成部分。

    Digital television operation business only can control and manage users precisely through these two systems . It is to say that the SMS is a part of CAS .

  18. 设计实现了高校项目数据上报异构集成平台的安全与访问授权控制模块等四大主要功能模块,并进行了系统的实际应用部署。

    Firstly , the four major modules of the heterogenous integration platform of university project application are developed . Then the system is deployed in real environment . 4 .

  19. 母公司对子公司的控制是以股权控制、授权控制和约定控制为基础的,并通过股权、人事、财务和战略控制方式来实施控制权。

    The parent companies realize their control to subsidiary companies by shares , staff , finance and stratagem on the bases of share control , commision control and contract control .

  20. 主要介绍客票系统5.0版中应用级系统安全控制的设计与实现。系统采用的是自上而下、逐级授权控制的机制;

    It was mainly discussed the design and implementation of application-level security control in Ticketing and Reservation System V5.0 . It was a top-down frame , and the permission was granted by administrative levels .

  21. 财务内控由组织控制法、授权控制法、预算控制法、货币资金内部控制法、应收与暂付款控制法、固定资产控制法、教育事业收入控制法构成。

    Financial internal control is made up of organization control , authority control , budge control , currency fund internal control , due and temporary fund control , fixed assets control and educational income control .

  22. 文章还针对不同应用的实际情况,提供了不同的调用方法和不同的授权控制办法,并充分考虑了系统的安全性问题。

    Papers also the actual situation of different applications , providing a different call methods and different ways to authorize the control and given full consideration to the issue of the safety of the system .

  23. 数字电视作为即将在全国范围内开展的信息服务,如何对其用户进行精确地授权控制与授权管理,从而实现数字电视业务的有偿服务就成为一个迫切需要解决的问题。

    Digital TV ( DTV ), as a kind of Information Service , is about to be developed in the whole country . A problem to be faced is how to authorization control & manage for the Pay-TV service .

  24. 本文采用模糊综合评价法计算主体可信度,使不同可信度值对应不同的资源使用权,方便、简洁地实现资源分发中的授权控制,避免了传统方法基于数字化凭证授权的繁琐与不便。

    This paper uses fuzzy comprehensive evaluation to evaluate subjects ' credibility with different credibility value having different resource usage rights . This method can achieve authorization control conveniently and briefly , avoiding the complexity and inconvenience of traditional authorization methods based on digital certificates .

  25. 作为信息系统,工作流管理系统中的安全问题值得考虑,一般威胁系统的安全问题有时间约束、静态权限控制、动态授权控制等等,都需要给出对应的安全机制。

    As a system of information , it is worth of regarding the security problems in workflow management system . Common threatens to system are restriction of time , static access control and dynamic authorization control , special security mechanism has to be provide for each threaten .

  26. 实际上,议会已授权政府控制烟草贸易。

    Parliament has in fact already authorised the government to tame the tobacco trade .

  27. GIS中基于角色的图元授权粒度控制研究

    Role-based Geographic Entities ' Authorized Granularity Control in GIS

  28. 权限管理设施(PrivilegeManagementInfrastructure,PMI),它为用户提供授权访问控制等方面的管理。

    PMI , which means privilege management infrastructure , provides management of authorization for access control .

  29. SCA授权策略控制能够访问SCA资源的用户、组和角色。

    SCA authorization policy controls the users , groups , and roles that can access SCA resources .

  30. RBAC根据用户在组织内所处的角色进行访问授权与控制。

    Hence , RBAC enforce access controls based on a user 's role in an organization .