privilege of access

英 [ˈprɪvəlɪdʒ ɒv ˈækses] 美 [ˈprɪvəlɪdʒ əv ˈækses]

网络  存取特许

计算机



双语例句

  1. Once they become controlling shareholders, acquirers can enjoy the privilege of getting access to both the capital market and banking sector to raise external finance.
    一旦他们成为控股股东,收购方就可以享受进入资本市场和银行界筹集外部资本的特权。
  2. They focused on the principles of least privilege and compartmentalization, both of which can help you design high-quality access models.
    他们主要讨论了最小特权原则和分隔的原则,这二者都可以帮助您设计高质量的访问模型。
  3. A new dynamic access control scheme, in which an entity's behavior and privilege can be dynamically and flexibly linked, is proposed to improve scalability and to restrain cheating of resource sharing in traditional role-based access control scheme in grid environment.
    针对网格环境下传统的基于角色的访问控制方式中资源共享的可扩放性和欺骗问题,提出了一种动态的访问控制方式。
  4. Abusing privilege is one of the primary causations to harm information security in Malicious or fraud application, this article introduces Object Oriented idea into restricting application codes, and brings forward one model named Object Oriented Access Control.
    恶意的或有漏洞的应用程序滥用权限是信息安全的重要威胁,本文把面向对象的思想用于应用层代码的存取控制,提出了面向对象访问控制模型。
  5. The important content of PMI ( Privilege Management Infrastructure) and model is to realize the efficient management of authorization and access control.
    PMI体系和模型的核心内容是实现授权与访问控制的有效管理。
  6. We also discuss the principle of system security such as privilege compartmentalization and least privilege and the characters of access control in Web-based applications.
    分析了金融决策支持系统中系统安全的权限分割,最小权限等基本原则,讨论了金融决策支持系统访问控制的特点,总结了本系统的访问控制需求和安全目标。
  7. PMI, which means privilege management infrastructure, provides management of authorization for access control.
    权限管理设施(PrivilegeManagementInfrastructure,PMI),它为用户提供授权访问控制等方面的管理。
  8. The system of Privilege Management and Access Control are made up of Privilege Management Infrastructure, Access Control Frame and Policy Regulation. In this system, Access Control Policy is the gist that users are accessed.
    权限管理基础设施,访问控制框架,策略规则共同构成权限管理和访问控制实施的系统平台,访问控制策略是决定用户访问权利的依据。
  9. In General Threshold Scheme, different numbers of private key fragments are distributed based on the differences of the privilege of escrow in which the greater privilege escrow can access to more fragments.
    普通门限方案根据托管者的特权不同,分配不同数目的密钥碎片。特权大的托管代理可获得多个密钥碎片。
  10. This dissertation present a way of authorizing privilege beforehand and validating twice basing on analyzing characters of information grid and RBAC summarizing the problems in multi-manage domain accessing control, which can give high and efficient service in access control.
    本文通过对信息网格特点和RBAC模型进行分析、总结多管理域访问控制在RBAC机制中存在的问题,提出一种权限预先分配和两次验证的访问控制方法,从而提高了访问控制效率;
  11. The waste of roles and rights doubtlessly increased the complexity of role management, and equal role is inconvenient in achieve least privilege, those legacy of the old RBAC is not suitable to the character of the distributed access control.
    角色和权限的冗余无疑增加了角色管理的复杂性,对等角色又不便于最小权限控制,这些传统的基于角色访问控制模型的不足,使其已不适合分布式访问控制的特点。
  12. Access control is an important protection for information systems. It is mechanism of ensuring the usability, integrality and creditability of resource through granting limit privilege of access resource to subject.
    访问控制是信息系统的一项重要安全保护机制,它是通过限制主体对资源的访问权限,从而保证资源的可用性、完整性和可信性的机制。
  13. It adapts authorization service and privilege management of application systems, which have many users and roles and base on J2EE. And it can implement system's access control on thin granularity.
    独立于具体应用;XML安全策略描述等,适用于基于J2EE的多用户多角色的大型应用系统的授权服务与权限管理,且较易实现细粒度的访问控制。
  14. In the document sharing as collaboration, the privilege authored to the users changes with the process of collaboration and as the owner of the sharing document the users has high autonomy in the authorization on the document, So its access control cannot use RBAC directly.
    这种文档共享的特点是:用户的权限随着协同工作的进行而变化且用户作为文档的共享者对文档的授权具有很高的自主性,因此RBAC模型不能满足其访问控制的需求。
  15. Compared with Discretionary Access Control ( DAC) and Mandatory Access Control ( MAC), Role-based access control ( RBAC) with Role Hierarchy, Least Privilege, Separation of Duty and other important characteristics, is more suitable for access control applications in multi-domain environment.
    基于角色的访问控制(RBAC)具有角色层次、最小特权和权限分离等重要特性,与自主访问控制(DAC)和强制访问控制(MAC)相比,更加适合多域环境下的访问控制应用。