| 1. | Fourth , design the whole access check strategy and the dac frame 四、设计了自主访问控制整体框架和安全检查策略。 |
| 2. | This dac mechanism works well in the secimos system , making it a solid ground for future research and development in dac direction 因而本文可作为将来在自主访问控制方面进一步深入研究和发展的基础。 |
| 3. | Discretionary access control ( dac ) is one of necessary and most common secure mechanisms in the secure operating system 自主访问控制机制( discretionaryaccesscontrol )是安全操作系统必不可少的、应用最广泛的安全机制之一。 |
| 4. | Delegation enhances the flexibility of authorization in access control and can be seen as a implement of dac security policy in some degrees 委托增加了访问控制中授权的灵活性,可看作在一定程度上实现了自主访问控制( dac )安全策略。 |
| 5. | Compared with traditional dac and mac models , role - based access control ( rbac ) model can provide better flexibility and scalability 基于角色访问控制模型rbac比传统的自主访问控制和强制访问控制更加优越,提供了更高的灵活性和扩展性。 |
| 6. | Based on various research results and practical experiences , we found that there is much to be done to improve dac mechanism in usability and security aspects 综合国际上已有的研究成果来看,随着越来越高的实际安全需要,自主访问控制在安全性和实用性方面都存在着可改进之处。 |
| 7. | Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage , dac would lead to access transfer and mac is lack of access mechanism in same level 传统的自主访问控制dac和强制访问控制mac都各自的缺点, dac会出现访问传递问题,而mac在同级间缺乏控制机制。 |
| 8. | The model is also applicable for xml schema documents . a flexible and practical method to enforce discretionary access control ( dac ) policy on xml documents is presented in this paper 2 )提出了一种灵活实用的方法对xml文档实施自主访问控制策略,该方法基于功能强大的xml模式而不是传统的dtd技术。 |
| 9. | Through researching on various access control mechanisms , an authorization management approach is introduced which combine discretionary access control with role - based access control 通过对各种访问控制机制的研究,提出了采用自主访问控制与基于角色的访问控制相结合的方法对企业电子文档的权限进行管理。 |
| 10. | The thesis overview the dac theory and the most commonly used dac mechanisms firstly . then , compatible with the remaining simple yet powerful file permission model , the acl introduced 本论文首先对自主访问控制的原理和实施机制进行研究分析,然后给出secimos安全操作系统的自主访问控制机制的设计与实现。 |