×

存取控制机制 meaning in English

access control mechanism
access-control mechanism

Examples

  1. At present , there is still a great deal of problem in the application of the secure model of the distributed database . under common circumstance , the secure usually is self - contradict with vivid in the database , while customer wanting to get stronger and vivid capability , needing the sacrifice to the database secure in some extent , vice versa . based on distributed database system and secure characteristic , this text analyzed its database safe strategy and related secure model , the system appearance and operate rule , the system appearance and operate rule , studied the customer role management , safe strategy and the role authorition problem , specially emphatically studied the bell . lapadula model . ( including its basic concept , system appearance , related operation and the secure rule gather ) . according to the actual application environment , this text carried bell . lapadula model to entity to turn , through a research discover that model adoption compulsory secure strategy , attain a vivid secure control not easily , so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model , and relatedly increased rule , put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ) . turn the rule principle according to the ddm secure mechanism and entity , designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism , and established the secure control mechanism of the dds secure controller
    拉帕丢拉模型进行实体化,通过研究发现该模型采用强制性安全策略,不易做到灵活的安全控制,因此添加自主存取控制机制的安全策略对原模型进行“松弛” ,并相应的增加了规则,提出一种新的安全机制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分布式数据库自主与强制性)安全机制。基于实体化规则原理,设计了一个采用ddm安全机制的数据库控制器? ? dds ( distributeddatabasesecure ,分布式数据库安全)控制器,并设置了dds安全控制器的安全控制机制。通过dds安全控制器在实践中的应用,本文分析了dds安全控制器的各项功能和安全特点,设计了实际应用中dds控制器的管理方案,实现了分布式数据库安全控制。
  2. The rule and the method are given for implementing the mapping from the former onto the latter . the system is composed of security information database , security managing module and privilege verifying module . firstly , it can process five types of authorization ( roles to users , functional modules to roles , module - partitions to roles , database objects to functional modules , database objects to roles ) ; secondly , it provides several access control mechanisms ( only one entrance , user authentication , menu level control , functional module level control , module partition level control , etc . )
    系统由安全信息库模块、安全管理模块、权限验证模块三部分组成,可以进行多种类型的授权(角色授予用户、功能模块权限授予角色、模块分区权限授予角色、数据库对象权限授予功能模块、数据库对象权限授予角色) ,实现了多种类型的存取控制机制(入口唯一、用户鉴别、菜单级控制、功能模块级控制和模块分区级控制等) 。

Related Words

  1. 运算机制
  2. 外来存取
  3. 存取算法
  4. 程序存取
  5. 存取系统
  6. 异地存取
  7. 最佳存取
  8. 存取错误
  9. 分布式存取
  10. 索引存取
  11. 存取控制过程
  12. 存取控制机构
  13. 存取控制级
  14. 存取控制寄存器
PC Version

Copyright © 2018 WordTech Co.