操作安全框 的英文怎麼說

中文拼音 [cāozuòānquánkuàng]
操作安全框 英文
safe action margin
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : 框名詞(框架; 框子) frame; case
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、系統、數據庫系統、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告事故,如何協調解決事故,如何避免事故再次發生。總之,本文對信息系統防範工給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的架。
  2. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在系統中實現多種策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級規則的強制訪問控制以及基於biba模型的強制訪問控制等多種策略,從而有效地增強了系統中信息的保密性和完整性。
  3. In this paper, the present situation of the application of slag pot carriers in china s iron & steel enterprises and their structural characteristics are introduced. the authors point out that the frame - type slag pot carrier has some advantages such as simple structure, convencient operation and good safety, so that the priority could been given to this carrier as selecting slag pot carrier

    介紹了渣罐運輸車在我國鋼鐵企業的應用現狀及其結構特點,指出架式渣罐運輸車具有結構簡單、方便、性好等優點,在選擇車型時可優先考慮。
  4. The web services platform is a simple, interoperable, messaging framework. it still misses many important features like security and routing. but, these pieces will come once soap becomes more advanced

    網路服務平臺是簡單的,能共同的,通信架。它仍缺少許多重要的特徵如和路由。可是一旦soap能變得更高級一些,這些特徵也就會有了。
  5. Games, and huge memory installed on the first around the rim, or the scope of their bodies was considered a failure, some more around the circle. late in the game would be more safe operation guide : very simple rules, the player controlled through key mobile huge memory 4d

    游戲中,貪吃蛇頭裝上四周的邊,或者碰上了自己的身體都算失敗,多繞一些大圈子,在游戲後期會比較指南:規則相當簡單,玩家通過方向鍵控制貪吃蛇四向移動
  6. In order to guarantee the storage of message steadily and permanently, we use jms to offer the storage of message queue. we also design a component named router to transform message. it is a good scheme to solve the problem in data sharing and exchanging

    在這個原型系統上實現了https協議下的報文傳輸和通信,利用jms提供消息隊列存儲服務保證了報文的持久穩定的保存,通過設計的消息路由器轉發消息較好地解決架中的數據共享和互
  7. The thesis is written to meet such demand. it starts with video monitor center software of electrization transformer substation, analyses video monitor system combining the technology of windows dna, designs the com component of user management, alarm record and operation record management used in video monitor system, analyses the whole framework of distributed video monitor system, and makes a through analysis of its security

    本論文正是基於這種需求,從電氣化變電所遠程視頻監控系統的調度監控中心軟體開發入手,結合windowsdna技術,分析了視頻監控系統,開發了用於視頻監控系統中用戶管理、報警記錄和記錄管理的com組件,設計了分散式視頻監控系統的整體架,對視頻監控系統的性做出了詳細的分析。
  8. In the paper, the theory of access control 、 the concept of system call 、 the mechanism of loadable module and multiple security strategy framework - - gfac are introduced in emphasis. the paper also introduce particularly the architecture 、 function components 、 design and implementation of operating system firework and its each component " design and implementation

    論文重點介紹了訪問控制的理論、系統調用的概念、可卸載內核模塊的機制以及多策略支持架gfac ;並詳細闡述了系統級防火墻的體系結構、各個功能模塊、設計與實現以及系統級防火墻各個組件的設計與實現。
  9. For this, based on analyzing formalized design method, principles and architecture for designing formal model are proposed, then according to them, the model is designed hierarchically. first, a formal framework for supporting multipolicy is presented. second, some component models are constructed, including dynamically mediated security level rang multilevel security model dmlr - mls, which is used to implement confidentiality policy, and renamed as dblp model after it is combined with dac model, based - dte integrity protection security model dte - ipm, and privilege control model pcm - rbpc based on capability mechanism, role mechanism and dte privilege mechanism

    本文主要研究開發高等級的系統所必需的策略形式模型,為此我們從形式設計方法的探討入手,確定模型設計的基本原則及組織結構,然後根據確定的組織結構逐步展開設計,提出支持多策略的形式架、實現機密性策略的可動態調節級范圍的多級模型dmlr _ mls (本文把它與dac模型合在一起形成dblp模型) 、基於dte技術實現完整性保護的形式模型dte _ ipm及基於權能、角色及dte的特權控制模型pcm _ rbpc 。
  10. This text expatiates the foundation top of the safe concept in population in the synopsis, measure to the population safety the evaluation index sign system set up and its deal turns, writer according to total leading thought that sets up the basis and the establishment of the principle, measure the evaluation system construction frame establishes, can operate the choice of the index sign, use the tree form diagram come out the index sign system manifestation, proceed the logic way of thinking that deal turn one by one to the index sign value, set up a set of systems completely, chien is clear, science, viable population safety measures the evaluation index sign system and its deals turn the early - warning standard, aiming at for research with establish the " 11 " population the development the strategy and should talk about of follow - up thorough research the offering consults basis

    摘要本文在簡要闡述人口概念的基礎上,對人口測評指標體系的構建及其量化,筆者按照構建的總體指導思想與原則的確立、測評體系結構架的設置、可指標的篩選並用樹狀圖把指標體系顯示出來和對入選指標逐一進行量化的邏輯思路,構建了一套系統面、簡明、科學、可行的人口測評指標體系及其量化預警標準,旨在為研究和制定「十一五」人口發展戰略以及該論題的后續深入研究提供參考依據。
  11. Starting from the designing of software stratification, i firstly introduce the idea of designing the strata of file management and how to realize this idea. then i elaborate in detail the realization of transactional atom operation and the user operation layer, the interface and communication between the realization of different strata ( flowing diagrams and framing designs have been given to some crucial operations ) and the means of realizing the data safety between these different strata

    從軟體分層設計思想入手,介紹了文件管理層設計思想和實現,詳述了業務原子的實現和用戶界面;詳細介紹了各層實現之間介面和通訊,並對一些關鍵給出了流程和架設計;詳述了各層如何實現數據
  12. This paper, after researching and analysing the security theories and technologies of traditional security operating system, with the characteristics of the embedded system, puts forward a security kernel frame which is suitable for embedded operating system : esk _ ec ( embedded security kernel of win ce )

    本文在研究分析傳統系統的理論和技術的基礎上,結合嵌入式系統的特點,提出了一種適合於嵌入式系統的架: esk _ ec ( embeddedsecuritykernelofwince ) 。
  13. Based on detailed analysis of security framework of j2ee and jboss, the thesis gives description of security problem from data and data operation aspects, and provides a data transmission solution based on rmi plus ssl, a data access control solution based on wwwwwh ( who, where, when, what, which, how ) security policy. the real system provides the security solution through proxy, which not only assures the high security of the system, but also improves the flexibility of the system

    本文在分析了jzee和jboss的架的基礎上,從數據與兩個方面對ip網路管理系統存在的問題進行了剖析,並從數據和系統效率的角度提出了rmi + ssl的數據傳輸方案、基於wwwwwh ( who , where , when , what , which , how )的訪問控制策略,並以代理模式實現了上述解決方案,從而不僅保證了數據傳輸和訪問的高性,也加強了系統的靈活性。
  14. This paper has introduced the principle of isakmp, a protocol used in dynamical key exchange, and has accounted for the theory of ipc ( inter - process communication ) and a kind of new socket type pf _ key, as well as their messaging activity and related operations. the paper has mainly analyzed the procedure of building messages in kernel and its communication with application, the methods of managing messages and sadb. finally, it has presented a design of ipc ( inter - process communication ) between kernel and application according to pf _ key protocol, which makes various users communicate with each other on different channels created dynamically

    本文簡要介紹了在ipsec中實現動態密鑰交換使用的通用架協議? ? isakmp的基本原理;詳細闡述了進程間通信機制和pfkey協議的基本原理、消息行為及相關;著重分析了系統內核消息構造及其與應用層通信的過程和系統內核處理消息、管理關聯數據庫( sadb )的方法;最終提出了利用pfkey套介面協議在系統內核與應用層之間進行通信,為不同的用戶對動態地建立不同的通道的設計方案。
  15. In this paper, the author establishes the mechanism - based frame for performing safety analysis, illustrates the basic principle of using each kind of safety analysis technique revolving around the mission of identifying accident scenario and its elements. the role of hazard analysis items in identifying scenario and their relationship is also specified, which improves the practicability of gjb900 accordingly

    論文提出了基於事故機理的性分析架,闡明了圍繞事故場景及其要素的鑒別來開展性分析的基本理論,明確了各類危險分析項目在事故場景及其要素鑒別上的用與相互關系,從而提高了我國國家軍用標準gjb900在工程中貫徹實施的系統性及可性。
  16. Rfsos was the first secure operating system that used the secure operating system architecture of generalized framework for access control in mainland china. in rfsos, security attribute database, secision enforcement module and security decision module are separate from each other. this architecture flexibly supports multiple access control mechanisms

    紅旗系統在國內首次採用基於通用訪問控制架的系統體系結構,將屬性數據、決策和決策實施三者分離,可以靈活地支持多種訪問控制機制。
  17. Firstly, based on the real situation of the chinese manufacturing industry, the state of the art of advanced patterns in e - manufacturing and related technologies are analyzed. a manufacturing information exchange pattern, which can support the enterprise application integration in the distributed and heterogeneous computer application environment, is put forward. then, the general model of manufacturing information exchange pattern in e - manufacturing is set up to realize the semantic and program codes interaction among different enterprises " information systems and ensure the security and reliability in exchanging manufacturing information

    首先,本文在分析國內外網路化製造先進模式及其相關技術的研究現狀的基礎上,結合我國國情和製造業現狀,提出了一種能夠在分佈、異構的計算機應用環境下支持企業應用系統集成的製造信息交換模式,建立了網路化製造中製造信息交換模式的總體架,有效的保障了不同應用系統之間語義和代碼層次的互以及製造信息交換的性和可靠性,為網路化製造中企業間製造信息的交換、共享和應用系統的集成提供了實現的基礎。
  18. This thesis analyzes the security risk of the municipal e - govemment network of chengdu, reports the specific security demands of the network, and defines the objectives of the network. applying the modem security theory and technology, build an integrated secure network with multi - layer protocol and multi - level structure. and design a security management plan which is very import in the whole security system

    在信息理論和技術架指導下,運用信息系統工程方法,針對協議層次和縱向結構層次的不同要求,設計具有一定創新的綜合體系,將物理、環境系統、通信、傳輸、應用、用戶以及管理等相結合,構成層次清晰、功能精幹強健的體系。
  19. In this paper, a sa framework for secure os named samsos, which follows eal3 class of cc, is put out and implemented in release version of rfsos

    遵循cc標準eal3級的要求,首次提出系統管理機制samsos ,並且在多政策支持架下成功實施。
  20. The hands - free and completely silent install options offer the ability to suppress either the prompting, the progress dialogs, or both

    使用無裝和完無提示裝選項可以禁止出現提示信息、進程對話,或同時禁止出現提示信息和進程對話
分享友人