| 1. | Mandatory access control modeling and security analysis : a petri - nets based method 网的强制访问控制模型及其安全分析 |
| 2. | Mandatory access control 强制访问控制 |
| 3. | How to enforce mandatory access control ( mac ) policy on xml documents is first proposed 3 )首次讨论了在xml文档中实施强制访问控制策略的方法。 |
| 4. | The authors want mandatory access controls in the linux kernel and that s the idea behind se linux 完成上述操作后,必须重新引导才能正确地安装这些服务。 |
| 5. | This linux version incorporates a strong , flexible mandatory access control architecture into the kernel :这个linux版本将强大、灵活的强制访问控制体系结构融入内核之中。 |
| 6. | This model can assign and manage the security labels of subject and object efficiently , implement mandatory access control between them 本文研究访问控制技术,分析传统嵌入式实时操作系统在安全方面存在的不足。 |
| 7. | The mixed access control of this model that combines mandatory access control with discretionary access control is described in detail 详细讨论了模型的混合访问控制方法,即强制访问控制与uosd访问矩阵相结合的方法。 |
| 8. | Put forward a control model which meet the demand of the security protection for spatial database and implement the mandatory access control 提出了适合于空间数据安全保护需求的控制模型,实现对空间数据的强制安全保护。 |
| 9. | In this technique , to control the users ' accesses , the role - based access control ( rbac ) and the mandatory access control ( mac ) were integrated to construct access matrix 在该显示技术中,结合角色的访问控制与强制的访问控制,建立访问矩阵对用户进行访问控制。 |
| 10. | Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage , dac would lead to access transfer and mac is lack of access mechanism in same level 传统的自主访问控制dac和强制访问控制mac都各自的缺点, dac会出现访问传递问题,而mac在同级间缺乏控制机制。 |