授權管理信息 的英文怎麼說

中文拼音 [shòuquánguǎnxìn]
授權管理信息 英文
emm entitlement management me age (emm)
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • 授權 : empower; authorize; warrant
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非訪問、泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統員的力和責任,包括物安全、系統配置、帳戶設置及使用限、口令、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對系統安全防範工作給出一個整體的解決方案,為其在配置、和應用方面提供了基本的框架。
  2. With the rapid development of the internet and electronic commerce, it is required that service division should be more and more specialized and fine - sorted. as a result, public - key infrastructure ( pki ), which has both the function for the authentication and the function for the authorization, has become maladjusted in the present information technology society

    隨著internet和全球電子商務的突飛猛進,對服務分工要求越來越細的同時,現有公鑰基礎設施pki框架中同時實現身份認證和的功能模式,已越來越不適應當代社會的發展需求。
  3. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的,提出一種訪問控制的增強型安全設計原則,基於此原則建立了和推薦式的安全訪問機制,用以提高系統的訪問安全性,並大大減少維護量;研究了特殊屬性對象的數據庫存儲機,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  4. Emm entitlement management message emm

    授權管理信息
  5. Emm entitlement management message

    授權管理信息
  6. So it is necessa1y to studyil1g deeply of natiol1al appropriative opefation information network security under tl1e studying of security system principle w1ich is universal relation, aj1d tl1e real circumstances of such nets of naoin, this tl1esis advances a secllrity demand al1d tactics to meet the naoin. lt laid special stress on sttlciyi11g basic principle and technology of pkl / ca ( public key infi ' astructlire / certificatiol1 autllority ), and tl1e way wliich cai1 be used i11 naoin. and it dctailed discuss tl1e way that would be coming tttie in u1e tra1sfornlil1g believable cl1viro11mel1t of inner naoin, wllich is using parca tech11ique

    本文通過對普遍適用的安全體系原及國家專用業務網這類特定系統的實際情況的研究,提出滿足國家專用業務網的安全需求和安全策略;重點研究了pki ca的基本原和技術,及其在國家專用業務網中的實現方法,詳細論述了利用pki ca技術改造本單位專用業務網的可任環境的實現方法;最後對基於ca的pmi (基礎設施)及其與pki的關系進行了探討。
  7. From the angle of corporate management function, enterprise credit management is management including ensuring accounts receivable safely and callback it in time, which is through establishing the credit management policy to instruct and correspond the operation activity of interior department, and monitor roundly collecting and evaluate client information, and granting line of credit, guarantying creditor ' s rights, call backing accounts receivable

    企業通過制定政策,指導和協調內部各部門的業務活動,對客戶進行收集和評估,對用額度的予、債保障、應收帳款回收等各交易環節進行全面監督,以保障應收帳款安全和及時回收的
  8. Inquiry can be made through the personal credit information database only with the authorization in writing by the person involved when personal loan application or credit card application is being reviewed, offer of guarantee by an individual assessed, or personal loan or credit card monitored for credit risks on a continued basis

    建立個人基礎數據庫既要實現商業銀行之間共享,方便群眾借貸,防範貸風險;又要保護個人隱私和安全,只能經當事人書面,在審核個人貸款、用卡申請或審核是否接受個人作為擔保人等個人貸業務,以及對已發放的個人貸款及用卡進行用風險跟蹤,才能查詢個人基礎數據庫。
  9. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中內容的原始性、真實性;電子檔案保層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復措施,通過對電子檔案載體的維護、建立電子檔案維護文檔等工作,確保在保期限中的電子檔案保持其可用性、可存取性、可解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案原始性、真實性有著重要意義。
  10. Emmg entitlement management message generator emmg

    授權管理信息發生器
  11. Emmg entitlement management message generator

    授權管理信息發生器
  12. Finally, studies the instruction system of cos upon a dedicated instruction of smartcos - xc. chapter 4 discusses the smartcos - xc and gives the design and implementing of a smart card file system framework. based on this, this paper gives a simulation of head - end encryption of entitlement control message ( ecm ) and entitlement management message ( emm ), and implements the decryption of ecm and emm in the smart card

    在對通用cos的研究的基礎上,首先簡單分析了smartcos - xc ,結合該cos ,論文針對有條件接收系統,按不同用途、不同類型分別設計並實現了存儲用戶及智能卡應用的文件體系結構,通過該cos的指令系統,設計並實現了模擬前端控制( entitlementcontrolmessage , ecm ) 、授權管理信息( entitlementmanagementmessage , emm )數據生成模塊及用戶端ecm 、 emm解密模塊。
  13. Secondly, we research on the structure of ca system. according to the essential task of the ca system, we design the basic scheme of scrambling and descrambling, and describe the generating, handing out and pick - up of ecm and emm message. we also discuss the implement of the conditional access module in set - top - box

    根據ca系統的基本任務,設計了加擾、解擾的基本方案;描述了授權管理信息( emm ) 、控制( ecm )生成、播發、提取的方法以及該生成模塊內各部件的介面關系;並對如何在機頂盒中實現條件接收功能模塊進行了探討。
  14. This paper emphasize on the research of security strategy of large rdb based on b / s three - tier system structure, and discuss of the data security management strategy from every side of account management, authority management, view management, rule management, audit monitor, data dictionary track. this paper, which use orient - object model designing idea, design and realize a common data security control of application system

    本論文側重研究基於b s三層體系結構下的大型關系數據庫的安全機制,從用戶機制、靜態設置、角色、審計監控、數據跟蹤,多側面、多角度討論了數據安全策略,並且利用面向對象建模思想,在《龍口港系統》中構建並實現這種通用模型? ?數據庫安全控制器dbsc的設計念。
  15. Conditional access ( ca ) is a technology used to control access to digital television ( dtv ) services to authorized users by encrypting the transmitted programming. an emm provides general information about the subscriber and the status of the subscription. the emm is sent with the ecm

    數字電視用戶系統通過對用戶訂購的記錄與處,形成用戶數據庫,並經由與條件接收系統的介面,向條件接收系統發送用戶授權管理信息的基本數據,條件接收系統據此實現對用戶收看數字電視節目的控制。
  16. First, we should establish the digital library copyright proction system in the principle of benefit balance. secondly, " fair use " should be improved. thirdly, we should make good use of legal permission, we may sign proper use contract and non - proper use contract to gain accreditment. fourthly, collective management system of copyright should be established

    著作集體組織處給數字圖書館帶來的便利有:降低著作使用的成本,解決海量,實現作品使用、服務的國際化,制定合的著作使用費標準,數字圖書館具有「海量數據庫」的著作人,著作集體組織可解決法定許可使用獲得報酬存在的問題。
  17. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵路系統現狀進行了分析,歸納出明確的需求及目標,並依據系統安全中有關訪問控制框架及機制的相關論設計並實現了鐵路系統安全框架中的數字證書( pki ca )及用戶目錄( ldap )系統、網路訪問代和認證機制、基於pki ca的身份認證和系統及應用系統安全框架和支持平臺。
  18. Internal control system about credit operational risk includes organization and management system, operational institution, authorization and award institution, information communication system, check and supervision institution and so on

    貸業務風險內控制度的主要內容包括組織體系、業務操作制度、制度、交流系統、檢查監督制度等幾個方面。
  19. Computer were put into use in the hospital in the foreign countries from the last 1950 ' s, since then, the number of computers in the hospitals have been greatly increased and it has formed a complete computer system. the hospital information system make use of the electronic computers and communication equipment to provide information of patients and hospital management for the departments attached to the hospital and it also collects, store, process, retrieve and exchange datas, it meets the function demand of authorized users, its content involves medical decision support, medical information system, medical research support system, medical education application, nurse application, medical information retrieving, medical image and signal processing, medical equipment intellectualization and hospital management information system and so on

    計算機在醫院的應用,在國外是從50年代後期逐漸發展的,四十多年來,醫院計算機應用得到空前發展,已基本形成一個較完善的體系。醫院系統即利用電子計算機和通訊設備,為醫院所屬各部門提供病人診療和行政的收集、存儲、處、提取和數據交換的能力,並滿足所有用戶的功能需求。內容上,涉及到醫學決策支持、醫學系統、醫學研究支持系統、醫學教育方面、護應用、醫學情報檢索、醫學圖像及號處、醫學儀器智能化及醫院系統等諸方面。
  20. The cisssps adopts three - layer - structure design conforming to j2ee standard, which internally includes platform modules such as search engine, application install management, data management, resources management, safety control etc. and externally provides unified connecting points for information service, unified customer identity attestation, authorization management and access control

    四川公安綜合查詢系統採用符合j2ee標準的三層架構設計開發,內部包含查詢引擎、應用配置、數據、資源、安全控制等平臺化組件;對外提供統一的服務接入,統一的用戶身份認證、和訪問控制。
分享友人