數據存取控制 的英文怎麼說

中文拼音 [shǔcúnkòngzhì]
數據存取控制 英文
data access control
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 數據 : data; record; information
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:、標識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The abstract method and the design idea of separating presentation, control, business and data access founded deeply for enhancing system efficiency, implement and reusing

    Watool分離表示、、業務和的系統設計思想和高度科學的抽象方法,為提高系統效率,實現設計與復用奠定了良好的基礎。
  3. The software of the chief station is composed of monitoring module and communicating module. the monitoring module involves the use of pc - labcards, the method of a precise timer, the principle of pid autocontrol and how to use it in the project, the realization of all kinds of reports with the ole automation skill, while the communicating module discusses the way of communication between the chief station and the scheduler based on the c / s structure. both monitoring module and communicating module are established on the database, so this paper particularly describes the access methods to ms sql server and the advantage of database stored procedure

    論文先概要介紹了熱網微機監系統的需求分析和總體設計,然後在此基礎上詳細地闡述了首站軟體實時監模塊和通信模塊的實現細節,描述了工業採集卡的用法;提出了一種基於內核timer對象的精確定時方法;介紹了pid自動原理及其改進演算法和現場的整定方法;用ole自動化技術擴充了visualbasic6 . 0的報表功能;在c / s用模型的基礎上實現了首站和調度站的異步通信;討論了visualbasic6 . 0對mssqlserver的方法和源驅動原理,在此基礎上充分利用儲過程完成了系統部分功能。
  4. Data access control

    數據存取控制
  5. Improve the rules of comparing the security label, which meet the practical demand of the access control for spatial database

    改進了安全級比較的規則,使得更適合現實中空間數據存取控制的需求。
  6. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括、無連接的完整性、源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  7. Using vb6. 0 and vc6. 0 to develop the system ' s working platform and software, through com technique, combining access database and excel digital table etc applied software to develop the printing system of data management, inquiring, forms for reporting statistics and graph curved line. the whole testing system is composed of three parts : server, client and execute part. the server part is made up of location, calculation, analysis parts

    整個測試系統大致分為三部分:服務器( server )部分;客戶( client ) ;執行( execute )部分,其中服務器部分由儲、輸出部分以及繪圖、計算部分組成,它可以實現、計算、分析和圖表功能;客戶部分由主程序部分組成,是面向操作者的主界面;硬體電路驅動部分和通訊部分是執行部分,負責響應由測試人員發出的命令,通過通訊電路對硬電路執行邏輯判斷和
  8. It solves payment issue through sharing pos and brush card. it solves info sharing and exchanging problem by enterprise application integration it adopts research method of software engineering and uses touch - screen, network, database technology and so on to carry through total design of the system and build the software : it uses user status identify and responsibility control to ensure database and application program ' s security ; it strengthen the code by coding optimize ; it captures and discards application runtime error to enhance the system ' s stability ; it uses multimedia voice and moving picture to show help information, thus makes the system easy to use ; it greatly reduces the maintenance work of the system by self - updating function ; it is an opening system by using star - model network top structure, supporting standard network communication protocol ? tcp / ip and offering standard software interfaced criterion

    論文採用軟體工程的研究方法,使用觸摸屏、網路、庫等技術,進行了系統總體方案設計和軟體開發:通過對庫和應用程序的用戶身份識別和權限,保證和應用程序的安全性;通過對代碼進行優化提高了代碼的健壯性;通過捕捉並拋出系統運行時的異常錯誤提高了系統的穩定性;通過多媒體語音、圖形和動畫提示幫助信息來增強系統的易用性;客戶端程序自動升級功能提高了系統的可維護性,有效地減少了維護工作量;系統採用星型的網路拓撲結構,支持標準的tcp ip網路通訊協議和規范的軟體介面標準,具有良好的開放性。
  9. The control logic is completed by fpga. the system control software provides several control functions of pci and dsp, such as adjusting pci bus configure registers, setting work mode, downloading dsp programs and data, reading processing results from dsp and saving data

    系統軟體提供了pci和dsp的功能:修改pci總線的配置寄器、設置工作方式、向各個dsp下載用戶程序與、從dsp中讀處理結果、檔等操作。
  10. In order to receive the data correctly and store it in computer for analysis and process, a kind of space tracking data recording system based on pci bus is designed and realized in this dissertation, which enhance the space tracking system ’ s integrality

    本課題正是在這種應用背景下,通過設計基於pci總線的系統,對航天測系統地面站綜合基帶設備字接收機所接收的中頻采樣信號和解調后的進行接收和儲,將其送到監計算機中進行調方案驗證和分析,從而進一步完善了航天測系統的設計。
  11. The spatial database can process the henter spatial data, which bring forward a new challenge for the access control of the of the database system

    空間庫能夠處理異構的空間,同時也給庫系統的帶來了新的問題。
  12. The computer mainly realizes the functions of long - range supervision and management and it includes : real time data communication, running state monitoring, history data save and print, error alarm, etc ; the industry computer system mainly compulish data acquisition and signal setting during the experiment and finish data storage and management ; the plc control system mainly accomplishes the on - off input and output, it accomplishes timing control, checks the status and carries the over - voltage and over - current protection ; except for acquiring experiment data, intelligent control instruments also have the function of errors diagnose and communication

    上位計算機的任務是實現遠程監測和管理,主要進行實時通信、運行狀態監視、歷史儲與列印、故障報警等;下位工業計算機主要用於實驗採集和參預置; plc系統主要完成開關量和部分模擬量的輸入輸出,實現系統運行的時序狀態巡檢和過載保護;智能監儀器除獲現場參外,還具有故障之診斷和通信功能。
  13. In access control, the process that enables, generally by the use of unique machinereadable names, recognition of users or resources as identical to those previously described to an adp system

    中,通常以機器可識別的名字來確認用戶及資源與先前對自動處理系統描述過的一樣的過程。
  14. In access control, the process that enables, generally by the use of unique machine - readable names, recognition of users or resources as identical to those previously described to an adp system

    中,通常以機器可識別的名字來確認用戶及資源與先前對自動處理系統描述過的一樣的過程。
  15. Property has parameters that match. concurrency control is a technique data stores use to control how data is read and changed in the store when multiple clients are accessing and manipulating the same data

    並發儲區使用的一種技術,可用於在多個客戶端訪問和操作相同如何在儲區中讀和更改這些
  16. Database management system. the component that controls the organisation, storage and retrieval of data ( fields, records and files ) in a database

    庫管理系統:庫中組織、儲和獲的組件。
  17. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體化,通過研究發現該模型採用強性安全策略,不易做到靈活的安全,因此添加自主的安全策略對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式庫自主與強性)安全機。基於實體化規則原理,設計了一個採用ddm安全機器? ? dds ( distributeddatabasesecure ,分散式庫安全)器,並設置了dds安全器的安全。通過dds安全器在實踐中的應用,本文分析了dds安全器的各項功能和安全特點,設計了實際應用中dds器的管理方案,實現了分散式庫安全
  18. What ' s more, with fundamental research, the following solutions were put forward : database connectivity technology, which can help to implement this system which works in client / server mode, the way of using ole ( object linking and embedding ) to solve the storage and retrieval problems of blob ( binary large object block ) data type and the method of directly giving the database system ' s operating purviews to right users with the application of dbms ' s authentication mechanism, which help to control database ' s access

    這些關鍵技術包括庫連接技術,以實現客戶/服務器模式下的庫開發;用ole技術解決大文本問題;結合dbms自身鑒別機,將庫系統權限賦予用戶,以用戶對的訪問。最後,本文對南京物流公司管理信息系統的開發工作進行了總結,並展望了開發運輸類公司mis的發展方向。
  19. The system performed as obtaining the real - time navigation information, adjusting the on - line control parameters, programming flight path, storing and analyzing data, which insured the realization of long distance flight

    系統實現了導航參實時獲、飛行在線調整、航跡規劃與回顯、儲及分析等功能,並為超視距飛行提供了有利保障。
  20. 4. the paper analyzes role - based access control ( rbac ) technologies and puts forward role - based control secure database management system model

    分析了基於角色的技術。提出了基於角色安全庫管理系統模型。
分享友人