约束验证 meaning in English
constraint validator
Examples
- Disabling a foreign key constraint enables data in the table to be modified without being validated by the constraints
禁用foreign key约束将使表中的数据不经约束验证便可修改。 - We characterized the security issues in asp - based networked manufacturing system , especially the issue of the user access control . then the typical methods of access control were introduced , which include discretionary access control ( dac ) , mandatory access control ( mac ) , role - based access control ( rbac ) , task - based access control ( tbac ) , coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on . based on that , we provided an integrated user access control model , which was composed of rbac , tbac , rdac and cbac
本章描述了asp和网络化制造系统的安全性问题,尤其是用户访问控制的问题;接着介绍了几种浙江大学博士学位论文典型的访问控制方法,包括强制访问控制、任意访问控制、基于角色的访问控制、基于任务的访问控制,以及基于公司关系的访问控制、基于企业联盟的访问控制等;在前面描述的典型访问控制模型基础上,给出了一个网络化制造系统的综合访问控制模型,包括网络化制造系统的用户和资源层次关系图、访问控制参考模型和访问控制过程模型,并定义了各个模型中的相关元素和关系,给出了各级约束验证和授权的表达;最后我们给出了以xacml为基础的网络化制造系统的访问控制描述语言。