授權訪問 的英文怎麼說

中文拼音 [shòuquánfǎngwèn]
授權訪問 英文
access will be granted
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • 授權 : empower; authorize; warrant
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. A combination of characters used to authorize access to a project

    用於授權訪問項目的字元組合。
  3. It is also possible to set up an authorized access list based on the end user s mac address

    還可以根據最終用戶的mac地址建立一個授權訪問列表。
  4. Prevention of unauthorized alteration, use, destruction, or release of data during authorized access

    在被授權訪問期間,防止對數據做未經的改變、使用、破壞和拋棄。
  5. In your asp. net application, you can specify that different users have authorized access to different resources

    在asp . net應用程序中,可以指定不同的用戶具有對不同資源的授權訪問
  6. Provide a mechanism that offers much finer granular access control than simply denying or granting access - that is, a mechanism that can enforce some before and after actions along with " permit " or " deny " permission

    提供一種機制,以比簡單地拒絕授權訪問更細粒度的控制,也就是說,在「允許」或「拒絕」之前或之後執行某些操作。
  7. You don ' t have permission to access / u on this server

    意思是你沒有被授權訪問這臺服務器!
  8. Access is granted using the grant passthru statement

    通過使用grant passthru語句可以授權訪問
  9. Or one of its descendants is authorized to access the server. the

    或其子代之一)已被授權訪問該服務器。
  10. S, rather than granting such permissions to individual pieces of running code

    授權訪問限,而不是向單個的一段運行代碼這種限。
  11. For this reason, unauthorized access to sensitive data is a security risk that you must address

    出於這個原因,對敏感數據的未授權訪問是您必須解決的安全隱患。
  12. I am wondering if i can have another e - mail sent to my new e - mail address, please

    您是否正在嘗試編輯別人的文章、論壇管理功能或是一些其它需要授權訪問的系統
  13. The pal can be configured to contain a list of logins and groups that are granted access to the publication

    可把pal配置為包含被授權訪問發布的登錄名和組的列表。
  14. The tradition safety technique such as authenticate, accredit, encrypt, fire - wall and the control of accessing can not protect the information of network well. the safety of network faces great challenge and imperil

    傳統的安全保護技術如認證、控制、防火墻和加密等外圍防衛機制已力不從心,計算機網路信息安全正面臨著極大的威脅和挑戰。
  15. Fifth, to advance the system usability, provides functional user managing interface, including dac management gui tools and two shell commands

    根據用戶指定方式或默認方式,阻止主體對客體的非授權訪問,並控制限擴散。
  16. The thesis emphasize further research on both identity identification and authorization access based on role access control. a new identity identification protocol and a new method of access authorization are presented

    論文著重對身份認證和基於角色的存取控制授權訪問進行了深入研究,並提出新的身份認證協議和方法。
  17. Only after the user is validated and authorized can the content stored in a cache ( including that deployed from the core node to an edge node and stream media content buffered like real, windows mms, etc. ) be provided directly from the cache at the edge node with the access time, number of accesses and data volume obtained recorded

    授權訪問在cache上緩存了的內容(包括由核心部署到邊緣節點上的內容以及流媒體緩存內容如real 、 windowsmms等) ,只有在用戶通過認證、的基礎上,才能直接從邊緣節點的cache上獲得服務,並且有時間、次數、獲取的數據量等等的記錄。
  18. Verification examines msil and metadata to find out whether the code is type safe, which means that it only accesses the memory locations it is authorized to access

    驗證過程檢查msil和元數據以確定代碼是否是類型安全的,這意味著它僅它已被授權訪問的內存位置。
  19. Since the most common transport protocol for web services is http, which is also the protocol that most of the internet infrastructure is built around handling, managing, load - balancing, and allowing access to applications through http is often much less troublesome than allowing access through other protocols

    由於web服務最常用的傳輸協議是http (大多數internet基礎結構也是以http協議為基礎構建的) ,所以通過http對應用程序進行操作、管理、負載均衡和授權訪問比通過其他協議要少一些麻煩。
  20. Incidents can include unauthorized access, malicious code ( such as viruses ), network probes, and denial - of - service attacks

    事件可能包括未授權訪問,惡意代碼(如計算機病毒) ,網路探測,拒絕服務攻擊。
分享友人