您要查找的是不是:
- This paper proposes an improved access control model for portal systems:P-RBAC. 提出了一种面向门户系统的访问控制模型P-RBAC。
- Presents a multi policies access control model supporting MLS,RBAC and DTE, and describes it formally. 研究RBAC、MLS和DTE模型,在此基础上提出一种多策略访问控制模型(MPACM),并采用形式化的方式描述;
- This paper presented a context access control model(CACM) based on UCONABC model. 基于使用控制模型(UCONABC),提出了普适计算的上下文访问控制模型(CACM)。
- Usage control model is a new access control model proposed nearly, it defines the framework of modern access control mod-el systematically and semantically. 使用控制模型是最近才提出的新型访问控制模型,它系统全面地定义了现代访问控制模型的框架。
- This paper gives a mandatory access control model based on both the DTE(Domain and Type Enforcement) prototype and the lattice model of security information flow. 本文介绍了以DTE为原型的强制访问控制模型和以格阵为原型的信息流模型。
- Research on GFAC and FLASK, presents an access control model frame suitable for ERTOS, this frame has open architecture and is easy to extend. 研究GFAC和FLASK框架,设计适合嵌入式操作系统的访问控制模型实现框架,该框架易于扩展,具有开放性;
- This Model can resolve various security problem of current applications, and can be extended to an access control model for the different domains. 该模型可以很好地解决现在一些系统中存在的安全问题,并且可以扩展成多域之间的安全互访问模型。
- Standard processes implement an access control model that allows full access to the owner of the process and administrative accounts with the Debug Programs privilege. 标准进程实施访问控制模式,允许使用“调试程序”权限完全访问进程所有者和管理帐户。
- MLSSP proposes a hierarchic access control scheme that has entrance and exit security policies and uses matrix-based and label-based access control model wholly. 为此本文在位置信息的层次域模型基础上构造了一种层次性的访问控制机制,它从访问的入口和出口两个方面综合考虑,综合使用了基于矩阵的和基于标号的访问控制模型。
- In the combination of RBAC96, ARBAC97 and NRBAC, aiming at the particularity of Intranet, the paper constructs a role_based access control model fitting for Intranet. 结合RBAC96、ARBAC97模型以及NRBAC模型,针对内部网存在的特殊要求,构造了一个适合内部网的基于角色的安全访问控制模型;
- Usage control model is a new access control model proposed nearly,it defines the scope and framework of modern access control model systematically and comprehensively. 使用控制模型是最近提出的新型访问控制模型,它系统全面地定义了现代访问控制模型的范畴和框架。
- According to the information security for campus grid in resource sharing and cooperation with each other, this paper proposes an access control model based on PMI. 针对目前高校信息共享和协作中所面临的信息安全问题,提出一种基于PMI的访问控制模型。
- A mandatory secure access control model named SOSACM of Operating System that is based on the multi-level security policy is put forward. Its confidetiality inherits the BLP model,and its definition of integrity is on the basis of Biba model. 提出了一个基于多级安全策略的强制访问控制模型;它的保密性安全规则是基于BLP模型;而完整性安全规则是基于Biba模型.
- After that, the security in SNMPvS is discussed including privacy &authentication mechanism and time-window detection. The emphasis is put on USM (User-based Security Model) and VACM (View-based Access Control Model). 在此基础上,讨论了SNMPv3的安全性,包括加密鉴别机制以及合时性检测,重点介绍了基于用户的安全模型和基于视图的访问控制。
- Mutability is a new concept,although its features can be found in traditional access control models and policies. 摘要 在传统的访问控制模型和策略中虽有可变的特性,但属性的可变性是一个全新的概念。
- Thirdly, it specifically explains existing information security model of WFMS, including workflow reference model, identity authentification model, access control model and authorization model. 然后详细的解释说明了当前已有的工作流管理系统的信息安全模型,包括工作流管理系统参考模型,身份认证模型,访问控制模型和授权模型。
- The theory and methods of object-oriented (OO) product information and access control modeling in AMS (agile manufacturing system ) are researched. 研究了敏捷制造系统中产品信息建模和访问控制建模的理论和方法,提出了面向对象的分解准则。
- Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, "Role-Base Access Control Models, " IEEE Computer, Vol. 29, No. 2, 1996, pp. 38-47. 蓝君琪,民93,以网路服务及多准则决策方法辅助供应链管理与整合之研究,朝阳科技大学资讯管理系硕士论文。
- The value of TTC for enhancing survivability is attested by formal proving,application demonstration and comparing with traditional access control models. 通过对模型的形式化证明,模型的应用示例,以及与传统访问控制模型的对比,证实了TTC模型在增强可生存性方面的价值。
- A Dynamic Context-Aware Access Control Model 上下文感知的动态访问控制模型