授權控制信息 的英文怎麼說

中文拼音 [shòuquánkòngzhìxìn]
授權控制信息 英文
entitlement control me age
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • 授權 : empower; authorize; warrant
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當網路配置后,用戶就可以在任一internet終端實現對監主機的訪問和,以進行調度優化,遠程診斷與維護。目前,這套工業遠程系統已在省計算機重點實驗室進行了運行測試,系統工作正常,達到了預期要求。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非訪問、泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Countermeasures for the serious problems of the financial control over subsidiary companies are to ( 1 ) establish a scientific share holding structure of its subsidiary companies ; ( 2 ) strengthen its control over authorization right of its subsidiary companies ; ( 3 ) establish a scientific budget duty system ; ( 4 ) establish a scientific financial reporting system ; ( 5 ) use modern technology of information and network to establish the financial balance network of business operation, accounting checking network and electronic bank system ; ( 6 ) perfect the target assessing system over its subsidiary companies ; ( 7 ) send financial supervisors to its subsidiary companies ; ( 8 ) strengthen the scheduled or nonscheduled financial audit over its subsidiary companies

    摘要子公司的財務問題日顯突出,解決的對策是:建立科學的子公司股結構;加強對子公司進行;建立科學的責任預算度;定科學的財務報告度;利用現代化的網路系統,建立經營業務結算網、會計核算網和網上銀行結算系統;完善對子公司的考核指標體系;向子公司委派財務總監來實現日常的財務監;加強定期或不定期審計,實現對子公司的財務監督。
  4. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問的增強型安全設計原則,基於此原則建立了管理和推薦式的安全訪問機,用以提高系統的訪問安全性,並大大減少管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  5. Ecmg entitlement control message generator ecmg

    授權控制信息發生器
  6. Ecmg entitlement control message generator

    授權控制信息發生器
  7. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全,通過對系統工作人員分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案原始性、真實性有著重要意義。
  8. Entitlement control message

    授權控制信息
  9. Finally, studies the instruction system of cos upon a dedicated instruction of smartcos - xc. chapter 4 discusses the smartcos - xc and gives the design and implementing of a smart card file system framework. based on this, this paper gives a simulation of head - end encryption of entitlement control message ( ecm ) and entitlement management message ( emm ), and implements the decryption of ecm and emm in the smart card

    在對通用cos的研究的基礎上,首先簡單分析了smartcos - xc ,結合該cos ,論文針對有條件接收系統,按不同用途、不同類型分別設計並實現了存儲用戶及智能卡應用的文件體系結構,通過該cos的指令系統,設計並實現了模擬前端授權控制信息( entitlementcontrolmessage , ecm ) 、管理( entitlementmanagementmessage , emm )數據生成模塊及用戶端ecm 、 emm解密模塊。
  10. Secondly, we research on the structure of ca system. according to the essential task of the ca system, we design the basic scheme of scrambling and descrambling, and describe the generating, handing out and pick - up of ecm and emm message. we also discuss the implement of the conditional access module in set - top - box

    根據ca系統的基本任務,設計了加擾、解擾的基本方案;描述了管理( emm ) 、授權控制信息( ecm )生成、播發、提取的方法以及該生成模塊內各部件的介面關系;並對如何在機頂盒中實現條件接收功能模塊進行了探討。
  11. Measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications

    保證通的可靠性,防止非使用電訊的方法和手段。
  12. The tradition safety technique such as authenticate, accredit, encrypt, fire - wall and the control of accessing can not protect the information of network well. the safety of network faces great challenge and imperil

    傳統的安全保護技術如認證、、訪問、防火墻和加密等外圍防衛機已力不從心,計算機網路安全正面臨著極大的威脅和挑戰。
  13. This paper emphasize on the research of security strategy of large rdb based on b / s three - tier system structure, and discuss of the data security management strategy from every side of account management, authority management, view management, rule management, audit monitor, data dictionary track. this paper, which use orient - object model designing idea, design and realize a common data security control of application system

    本論文側重研究基於b s三層體系結構下的大型關系數據庫的安全機,從用戶管理、、靜態設置、角色管理、審計監、數據跟蹤,多側面、多角度討論了數據安全管理策略,並且利用面向對象建模思想,在《龍口港系統》中構建並實現這種通用模型? ?數據庫安全器dbsc的設計理念。
  14. Space data and information transfer systems - standard formatted data units - control authority procedures

    航天數據和發送系統.標準格式數據單元.程序
  15. Conditional access ( ca ) is a technology used to control access to digital television ( dtv ) services to authorized users by encrypting the transmitted programming. an emm provides general information about the subscriber and the status of the subscription. the emm is sent with the ecm

    數字電視用戶管理系統通過對用戶訂購的記錄與處理,形成用戶數據庫,並經由與條件接收系統的介面,向條件接收系統發送用戶管理的基本數據,條件接收系統據此實現對用戶收看數字電視節目的
  16. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵路系統現狀進行了分析,歸納出明確的需求及目標,並依據系統安全中有關訪問框架及機的相關理論設計並實現了鐵路系統安全框架中的數字證書( pki ca )及用戶目錄管理( ldap )系統、網路訪問代理和認證、基於pki ca的身份認證和系統及應用系統安全框架和支持平臺。
  17. Asp. net controls access to site information by comparing authenticated credentials, or representations of them, to ntfs file system permissions or to an xml file that lists authorized users, authorized roles groups, or authorized http verbs

    通過將已驗證憑據或它們的表示形式與某些內容進行比較, asp . net可以對站點的訪問;這些內容可以是ntfs文件系統限,也可以是列出了已用戶、已角色(組)或已http謂詞的xml文件。
  18. Internal control system about credit operational risk includes organization and management system, operational institution, authorization and award institution, information communication system, check and supervision institution and so on

    貸業務風險內度的主要內容包括組織管理體系、業務操作度、度、交流系統、檢查監督度等幾個方面。
  19. User can access the information which accord with he ' s status

    這樣網路中各政府機關根據用戶的訪問進行自己資源的
  20. Rcbac model introduces the context information and the group mechanism to the access control policies. in rcbac, the context information is used to control the user assignment and permission assignment dynamically and the group mechanism is used to simplify authorization further. thus, rcbac can implement the fine - grained access control and satisfy the enterprise ’ s demand for the unified resource access control

    在對rbac的一些改進模型分析研究的基礎之上提出了基於角色和上下文的訪問模型( roleandcontext - basedaccesscontrol , rcbac ) , rcbac模型將上下文和組化機引入到訪問策略中,利用上下文動態地用戶分配和限分配,利用組化機進一步簡化,實現了細粒度的訪問,滿足了企業統一資源訪問的需求。
分享友人