强制访问控制 meaning in English
mac
mandatory access control
Examples
- The paper emphasizes the theory and realization of mandatory access control , including the realization of mandatory access control on inter - process communication and network , and elaborates how mandatory access control defends system against trojan horse
论文重点介绍了强制访问控制机制的理论及实现,包括进程间通信的强制访问控制以及网络强制访问控制的实现,并详细阐述了强制访问控制对特洛伊木马的防范。 - This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ) , mandatory access control ( mac ) and least privilege management . finest granularity dac allows that the owner of an object can choose to grant access permission to any other user
本论文主要在文件访问控制和特权管理这两方面对linux的安全性进行增强,即实现了细粒度的自主访问控制、强制访问控制、以及最小特权管理。 - This thesis researchs the correlative security evaluation criteria and analyses in detail linux kernel at first . linux kernel is improved at four aspects : access control list , capability , system audit , mandatory access control , based on linux kernel 2 . 4 . 4 on tcsec and the security level of linux is enhanced from cl to bl
本论文首先研究了相关的安全评估标准,并对linux内核进行了详细地分析,然后以tcsec为标准,基于linux内核2 . 4 . 4 ,分别从访问控制表、权能、系统审计以及强制访问控制四个方面时linux内核进行了改进,使linux的安个级别从c1级提高到了b1级。 - The paper first analyzes today ’ s three main access control technologies ? discretionary access control ( dac ) , mandatory access control ( mac ) and role - based access control ( rbac ) , and then points out that the traditional dac and mac are unable to satisfy the enterprise ’ s demand for the unified resource access control . however , although rbac has many merits , it is essentially still a subject - based static authorization model , and lacks the enough flexibility , dynamic characteristics and scalability and cannot satisfy the enterprise ’ s demand for the unified resource access control completely . based on the analytical research for rbac ’ s improved models , the paper proposes the role and context - based access control ( rcbac ) model
本文首先分析了当前三种主要的访问控制技术? ?自主访问控制( discretionaryaccesscontrol , dac ) 、强制访问控制( mandatoryaccesscontrol , mac )和基于角色的访问控制( role - basedaccesscontrol , rbac ) ,认为传统的dac和mac无法满足企业统一资源访问控制的需求,而rbac尽管有很多的优点,但它本质上仍然是以主体为中心的、静态的授权模型,缺乏足够的灵活性、动态性和伸缩性,并不能完全满足企业统一资源访问控制的需求。 - In the beginning of the thesis , we introduce the security model and critical technique for developing bl level security spatial database ; especially describe the models of discretionary access control and mandatory access control . then we indicate the deficiency of the comparison of the security label in the practical application , and give the improved rules of security label comparison
本文首先介绍了开发b1级安全数据库的安全模型及其关键技术,着重描述了自主和强制访问控制的模型,然后指出blp模型安全级的比较在实际应用中的不足,给出改进的安全级比较规则。