Final , it discusses three grid resource access control models , and these models provide theoretical reference for the implementation of different access control policy 最后,讨论了三种网格的资源访问控制模型,为实现不同的访问控制策略提供了理论支持。
The design principle of access control technology in ertos is analysed . 3 . presents a multi policies access control model supporting mls , rbac and dte , and describes it formally 在此基础上,基于嵌入式实时操作系统对访问控制的特殊要求,提出一种多策略访问控制模型及其实现框架。
Base on lsm framework , many different access control models have been implemented as loadable kernel modules . this paper has researched the mechanism of the lsm , and implemented a kind of security auditing policy 本文对lsm的设计和安全策略的实现进行深入的研究,并运用lsm的可移植性提出了一种基于lsm的通用安全审计系统。
A method for implementing privileged management in security management based on role - based access control model ( rbac ) is proposed in order to implement security management in the database application system 为了实现分布式数据库应用系统的安全管理,提出了在基于角色的存取控制模型( rbac )的基础上实现安全管理中权限管理的一种方法。
Through the jaas and rights - based access control model , we provide a flexible , configurable and extensible security service framework , which can integrate various kinds of security mechanism and policy 通过jaas这种pam框架和基于rights的访问控制模型等,我们提供了一个灵活的、可配置的和可扩展的安全服务框架,以便能够集成多种安全机制和策略。