×

强制访问控制 meaning in English

mac
mandatory access control

Examples

  1. The paper emphasizes the theory and realization of mandatory access control , including the realization of mandatory access control on inter - process communication and network , and elaborates how mandatory access control defends system against trojan horse
    论文重点介绍了强制访问控制机制的理论及实现,包括进程间通信的强制访问控制以及网络强制访问控制的实现,并详细阐述了强制访问控制对特洛伊木马的防范。
  2. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ) , mandatory access control ( mac ) and least privilege management . finest granularity dac allows that the owner of an object can choose to grant access permission to any other user
    本论文主要在文件访问控制和特权管理这两方面对linux的安全性进行增强,即实现了细粒度的自主访问控制、强制访问控制、以及最小特权管理。
  3. This thesis researchs the correlative security evaluation criteria and analyses in detail linux kernel at first . linux kernel is improved at four aspects : access control list , capability , system audit , mandatory access control , based on linux kernel 2 . 4 . 4 on tcsec and the security level of linux is enhanced from cl to bl
    本论文首先研究了相关的安全评估标准,并对linux内核进行了详细地分析,然后以tcsec为标准,基于linux内核2 . 4 . 4 ,分别从访问控制表、权能、系统审计以及强制访问控制四个方面时linux内核进行了改进,使linux的安个级别从c1级提高到了b1级。
  4. The paper first analyzes today ’ s three main access control technologies ? discretionary access control ( dac ) , mandatory access control ( mac ) and role - based access control ( rbac ) , and then points out that the traditional dac and mac are unable to satisfy the enterprise ’ s demand for the unified resource access control . however , although rbac has many merits , it is essentially still a subject - based static authorization model , and lacks the enough flexibility , dynamic characteristics and scalability and cannot satisfy the enterprise ’ s demand for the unified resource access control completely . based on the analytical research for rbac ’ s improved models , the paper proposes the role and context - based access control ( rcbac ) model
    本文首先分析了当前三种主要的访问控制技术? ?自主访问控制( discretionaryaccesscontrol , dac ) 、强制访问控制( mandatoryaccesscontrol , mac )和基于角色的访问控制( role - basedaccesscontrol , rbac ) ,认为传统的dac和mac无法满足企业统一资源访问控制的需求,而rbac尽管有很多的优点,但它本质上仍然是以主体为中心的、静态的授权模型,缺乏足够的灵活性、动态性和伸缩性,并不能完全满足企业统一资源访问控制的需求。
  5. In the beginning of the thesis , we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control . then we indicate the deficiency of the comparison of the security label in the practical application , and give the improved rules of security label comparison
    本文首先介绍了开发b1级安全数据库的安全模型及其关键技术,着重描述了自主和强制访问控制的模型,然后指出blp模型安全级的比较在实际应用中的不足,给出改进的安全级比较规则。
More:   Prev  Next

Related Words

  1. 强制劳役
  2. 强制管辖
  3. 强制保护
  4. 强制禁运
  5. 强制旋涡
  6. 强制函数
  7. 强制命令
  8. 强制鼓风机
  9. 强制替换
  10. 强制引航
  11. 强制法, 强力法
  12. 强制反应法
  13. 强制放电
  14. 强制肥育
PC Version

Copyright © 2018 WordTech Co.