说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 访问控制矩阵
1)  access control matrix
访问控制矩阵
1.
By using access control matrix,we can achieve the real time and dynamic control of task,which ensures the system security.
比较了一些现有访问控制模型的各自特点和适用范围,针对现有模型的不足,在基于角色任务访问控制模型的基础上,提出对数据对象、操作、及其相应的权限细粒度化的观点;通过引入访问控制矩阵,实现了对任务的实时、动态的控制,从而确保了系统的安全。
2.
Combining with Data Center of Surveying & Mapping?s actual situation of security and confidentiality,the model uses the set theory to implement the construction principle and implementation methods of access control matrix,audit and alarm technology,which discusses the related security strategy and gives examples of the model?s construction.
结合国家基础地理信息中心安全保密管理的实际,采用集合论方法给出了访问控制矩阵、审计和报警技术的构建原理与实现方法,并讨论了相关安全策略,给出了模型构建的实例。
2)  access matrix
访问矩阵
1.
Establishment of four-dimension access matrix model;
一种四维访问矩阵模型的建立
2.
As this paper points out that Lampson’s access matrix is the most fine-grained access control model, the other security policies need to group access matrix according to their different application requirements.
指出Lampson访问矩阵模型是对最细粒度访问控制的抽象,普通安全策略则根据应用安全需求对Lampson访问矩阵进行聚合。
3.
In this paper, a subject-role-permission 3-dimensional access matrix model(SRPAM), proposed by introducing a role dimension, could resolve the above-mentioned bugs referred all above.
传统的主体-客体访问矩阵模型都是基于特定的授权策略,将主/客体与标识或属性一一绑定实现,通用性和可扩展性不高。
3)  accessing control
访问控制
1.
The article emphasizes on discussing the two measures to protect the datum in the network:accessing control measure and information encryption measure.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
2.
The paper introduces the three kinds of threatens to campus network s safety and resolving methods, especially showing how to use the method of accessing control to safeguard the campus network
介绍了目前校园网面临的3种安全威胁以及应对技术,重点说明了使用访问控制策略保障校园网安全。
4)  access control
控制访问
1.
In order to take effective precautions against illegal operation of routers and strengthen the security of computer network, this paper briefly introduces some kinds of the configuration methods of access control ASN routers.
为有效防范非法操作路由器,增强计算机网络的安全性,简要介绍了几种控制访问ASN路由器的配置方法。
5)  Access control
访问控制
1.
Application of extended role-based access control under the struts framework;
扩展的角色访问控制模型在Struts结构下的应用
2.
A lattice-based access control model;
一种基于格的访问控制模型
6)  interview control
访问控制
1.
This paper discusses the interview control model based on roles firstly,and then brings forward a model of purview assignment based on role and interview control,finally it was realized in police technological investigation managerial system.
访问控制是软件系统安全性重要的组成部分。
补充资料:动态矩阵控制
分子式:
CAS号:

性质:它是一种基于对象阶跃响应为模型的预测控制算法。通常包括以阶跃响应作为预测模型,二次型目标函数为优化目标的滚动优化策略和输出的实时测量值作为反馈校正三大部分。它适用于渐近稳定的线性对象,并已在石油,化工等过程控制领域获得广泛应用。

说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条