| 1. | Mandatory access control modeling and security analysis : a petri - nets based method 网的强制访问控制模型及其安全分析 |
| 2. | Mandatory access control 强制访问控制 |
| 3. | Explains the architecture of acl classes that are used to enforce access control and audit rules 解释用于强制访问控制和审核规则的acl类的结构。 |
| 4. | How to enforce mandatory access control ( mac ) policy on xml documents is first proposed 3 )首次讨论了在xml文档中实施强制访问控制策略的方法。 |
| 5. | This linux version incorporates a strong , flexible mandatory access control architecture into the kernel :这个linux版本将强大、灵活的强制访问控制体系结构融入内核之中。 |
| 6. | The validation of xml documents under mac policy is defined to improve the usability of systems processing valid documents 定义了强制访问控制策略下xml文档的有效性,提高了处理有效文档的系统的可用性。 |
| 7. | 3 . in order to ensure high security , this paper adopts mac technology . each use of the interfaces will be checked 3 .为保证高安全性,安全核中采用强制访问控制技术,使得对内核的每个接口调用都能够进行安全检测。 |
| 8. | The mixed access control of this model that combines mandatory access control with discretionary access control is described in detail 详细讨论了模型的混合访问控制方法,即强制访问控制与uosd访问矩阵相结合的方法。 |
| 9. | Compared with traditional dac and mac models , role - based access control ( rbac ) model can provide better flexibility and scalability 基于角色访问控制模型rbac比传统的自主访问控制和强制访问控制更加优越,提供了更高的灵活性和扩展性。 |
| 10. | Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage , dac would lead to access transfer and mac is lack of access mechanism in same level 传统的自主访问控制dac和强制访问控制mac都各自的缺点, dac会出现访问传递问题,而mac在同级间缺乏控制机制。 |