| 1. | In discretionary access control lists dacls are removed 的任何审核ace将被移除。 |
| 2. | Discretionary access control 任意访问控制 |
| 3. | Presents platform sdk recommendations about privileges , buffer overruns , discretionary access control lists dacls , and passwords 介绍有关的platform sdk建议,包括特权、缓冲区溢出、任意访问控制列表( dacl )和密码。 |
| 4. | The mixed access control of this model that combines mandatory access control with discretionary access control is described in detail 详细讨论了模型的混合访问控制方法,即强制访问控制与uosd访问矩阵相结合的方法。 |
| 5. | Discretionary access control ( dac ) is one of necessary and most common secure mechanisms in the secure operating system 自主访问控制机制( discretionaryaccesscontrol )是安全操作系统必不可少的、应用最广泛的安全机制之一。 |
| 6. | Discretionary access control ( dac ) and mandatory access control ( mac ) models both have some disadvantage , dac would lead to access transfer and mac is lack of access mechanism in same level 传统的自主访问控制dac和强制访问控制mac都各自的缺点, dac会出现访问传递问题,而mac在同级间缺乏控制机制。 |
| 7. | The model is also applicable for xml schema documents . a flexible and practical method to enforce discretionary access control ( dac ) policy on xml documents is presented in this paper 2 )提出了一种灵活实用的方法对xml文档实施自主访问控制策略,该方法基于功能强大的xml模式而不是传统的dtd技术。 |
| 8. | Through researching on various access control mechanisms , an authorization management approach is introduced which combine discretionary access control with role - based access control 通过对各种访问控制机制的研究,提出了采用自主访问控制与基于角色的访问控制相结合的方法对企业电子文档的权限进行管理。 |
| 9. | This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ) , mandatory access control ( mac ) and least privilege management . finest granularity dac allows that the owner of an object can choose to grant access permission to any other user 本论文主要在文件访问控制和特权管理这两方面对linux的安全性进行增强,即实现了细粒度的自主访问控制、强制访问控制、以及最小特权管理。 |
| 10. | Nevertheless , some traditional approaches , such as discretionary access control and mandatory access control , are not suitable for systems where more sophisticated access control is needed . as a result , rbac has become a hotspot in research community in recent years 然而,传统的访问控制技术? ?自主型访问控制和强制型访问控制,远远落后于当代系统安全的需求,基于角色的访问控制( role - basedaccesscontrol ,简称rbac )作为一种新型的访问控制技术成为了近年来相关领域研究的热点。 |