强制访问控制

  • 网络mandatory access control;mac;mandatory access control, MAC;dac;MAC Mandatory Access Control
强制访问控制强制访问控制
  1. 我们还分析了强制访问控制的不足、对策以及可能造成的性能损失。

    We also analyze the shortcoming of MAC , its countermeasure and possible performance decrease .

  2. 定义了强制访问控制策略下XML文档的有效性,提高了处理有效文档的系统的可用性。

    The validation of XML documents under MAC policy is defined to improve the usability of systems processing valid documents .

  3. 基于C级数据库管理系统的强制访问控制模块的设计

    The Mandatory Access Control Module Design based on C DBMS

  4. 一个改进的细粒度XML文档强制访问控制模型

    Improved Fine-grained Mandatory Access Control Model for XML Document

  5. 基于LogicSQL数据库的强制访问控制研究

    Research of mandatory access control based on the database of Logic SQL

  6. 基于Linux的强制访问控制机制及其安全测试自动化的研究

    Implementation and Automatic Testing of Mandatory Access Control on Linux

  7. 基于强制访问控制的安全Linux系统设计与实现

    Design and Implementation of Secure Linux System Based on Mandatory Access Control

  8. 在LINUX核心实施强制访问控制

    Enforcing Mandatory Access Control in Linux Kernel

  9. 对于Linux内核来说,强制访问控制和基于角色的访问控制都是相对较新的功能。

    Mandatory access control and role-based access control are relatively new to the Linux kernel .

  10. 这种控制类型称为强制访问控制(MAC)。

    This type of control is called mandatory access control ( MAC ) .

  11. 取而代之的,NSA长期以来一直希望操作系统同样能支持“强制访问控制(mandatoryaccesscontrol)”(MAC)机制。

    Instead , NSA has long wanted operating systems to also support " mandatory access control "( MAC ) mechanisms .

  12. 结合强制访问控制实现基于IPSec协议的网络安全模型

    Implementing Network Security Model Based on IPSec Protocol Integrating with Mandatory Access Control

  13. 到目前为止,SELinux是针对Linux的最有名的MAC系统(强制访问控制)。

    SELinux is by far the most well-known MAC system for Linux ( mandatory access control ) .

  14. 它比强制访问控制(MAC)和自主访问控制(DAC)更适用于非军事的数据处理。

    It is appropriate for industry and civilian government than Mandatory Access Control and Discretionary Access Control .

  15. 本文围绕安全操作系统中强制访问控制部分的理论和研究,自行构建了Linux系统的强制访问控制机制。

    This paper studied the theory and related research about Mandatory Access Control in Secure OS based on what I enhanced the MAC mechanism on Linux .

  16. 本论文主要在文件访问控制和特权管理这两方面对Linux的安全性进行增强,即实现了细粒度的自主访问控制、强制访问控制、以及最小特权管理。

    This paper enhances the Linux operating system security mainly by finest granularity Discretionary Access Control ( DAC ), Mandatory access control ( MAC ) and Least Privilege Management .

  17. 本文着重论述利用Linux支持的可加载内核模块实现的基于强制访问控制的Linux安全操作系统的体系结构及其功能单元和相关技术细节。

    This paper focuses on discussing the architecture of the MAC - based Linux security operating system implemented with LKM supported by Linux , and introduces the key technica of implementation .

  18. 基于PostgreSQL的强制访问控制的实现

    Implementation of Mandatory Access Control Based on PostgreSQL

  19. 同传统的自由访问控制(DAC)和强制访问控制(MAC)相比,基于角色的访问控制(RBAC)代表了在灵活性和控制粒度上的一个重大进步。

    Role-based access control ( RBAC ) represents an important advancement in flexibility and granularity of control from the classical discretionary and mandatory access control .

  20. 常见的访问控制方式有:自主访问控制(DAC)和强制访问控制(MAC)以及基于角色的访问控制(RBAC)。

    Access control models include : conventional discretionary access control ( DAC ), mandatory access control ( MAC ) and role-based access control ( RBAC ) .

  21. 它包括构建在FluxAdvancedSecurityKernel(Flask)安全架构之上的强制访问控制,后者包括以插件模块形式提供的类型强制和多级安全(MLS)。

    It includes mandatory access control built on top of the Flux Advanced Security Kernel ( Flask ) security architecture , including type enforcement and multilevel security ( MLS ), all as plug-in modules .

  22. 传统的自主访问控制(DAC)和强制访问控制(MAC)由于使用的局限性,已经不能满足现代应用系统对安全性的要求。

    Traditional discretionary access control ( DAC ) and mandatory access control ( MAC ) due to the use of limitations , they can no longer meet modern requirements for safety .

  23. 通过执行网络相关操作的强制访问控制策略,并根据IPSec协议对网络通信执行强制加密策略,从而构造具有广泛适应性的网络安全体系结构模型。

    In this paper , the widely flexible network security architecture model is constructed by providing network related mandatory access control policy and performing mandatory encryption policy on network communication based on IPSec protocols .

  24. KYLIN操作系统在内核实现了基于角色定权的强制访问控制框架(RBA),用于保障系统的安全。

    KYLIN OS implemented the role-based mandatory access control framework ( RBA ) in the kernel to protect the safety of the system .

  25. 本文基于这一强制访问控制机制,在XEN虚拟机环境上设计并实现了一个访问控制系统的原型,并做了相关试验。

    Based on this access control mechanism , a prototype system is designed and implemented in the XEN virtual machine environment , and do the relevant experiment .

  26. 安全系统对Linux系统资源实施强制访问控制,保护资源的机密性、完整性,系统具有入侵追踪功能,能够很好地抵御本地与网络入侵。

    The secure system implement the mandatory access control policy , and protect the confidentiality and integrity of the resources in linux . The secure system can trace back to the information of the attacker , and resist the attacks from local or remote .

  27. 提出了一种基于P2DR的、不可旁路的强制访问控制技术。

    A mandatory access control technique is proposed which is based on P2DR and cannot be bypassed .

  28. 其中强制访问控制是安全数据模型中最重要的部分,是系统安全等级能否达到B1级的重要决定因素。

    Mandatory Access Control ( MAC ) is the most important part of the secure data model and is a fatal factor which determines whether a secure level of the database system can reach Bl level .

  29. 基于角色的访问控制(RBAC)具有角色层次、最小特权和权限分离等重要特性,与自主访问控制(DAC)和强制访问控制(MAC)相比,更加适合多域环境下的访问控制应用。

    Compared with Discretionary Access Control ( DAC ) and Mandatory Access Control ( MAC ), Role-based access control ( RBAC ) with Role Hierarchy , Least Privilege , Separation of Duty and other important characteristics , is more suitable for access control applications in multi-domain environment .

  30. 将基于角色的访问控制(RBAC)与强制访问控制(MAC)相结合,提出了面向变电站信息模型的访问控制(SIMOAC)。

    Normal access control model cannot settle substation access control management problem . Therefore , combined with role based access control ( RBAC ) and mandatory access control ( MAC ), a substation information model oriented access control ( SIMOAC ) is proposed .