物理訪問控制 的英文怎麼說
中文拼音 [wùlǐfǎngwènkòngzhì]
物理訪問控制
英文
physical access control- 物 : 名詞1 (東西) thing; matter; object 2 (指自己以外的人或與己相對的環境) other people; the outsi...
- 理 : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 控 : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
- 制 : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
- 物理 : 1. (事物的內在規律) innate laws of things2. (物理學) physics
- 訪問 : visit; call on; interview; access; addressing; reference to
- 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
-
The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。Consequently, the author presents the basic principle of ofdm, and the process how to utilize the certain technology based on fft & ifft to realize the ofdm system
描述了802 . 11協議介質訪問控制層和物理層的操作及幀結構。接著,作者論述了ofdm的基本原理,以及如何用基於fft和ifft的技術實現ofdm系統。Secondly, based on the function requirement of usb device controller the system was divided into five modules, clock extracting, event detect, physical layer interface, media access controller, endpoint control layer and every module was designed in detail
其次,針對usb設備控制器的功能要求,將系統分為時鐘提取、事件檢測、物理層、介質訪問層、端點控制層五個模塊並對每個模塊進行了詳細設計。Memory management unit, translates virtual to physical addresses and provides access permission control
內存管理單位,把虛地址轉化為物理地址並且提供訪問許可控制。Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic
以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:數據鏈路層和物理層,並將其細分為一些功能子層,包括數據鏈路層的llc (邏輯鏈路控制)子層和mac (介質訪問控制)子層,物理層的pcs (物理編碼子層) 、 pma (物理介質附加子層)和pmd廈門大學碩士學位論文摘要(物理介質相關于層) 。In order to save the energy and based on the protocol of ieee 802. 15. 4, we add a timer to maintain the physical and mac layer automatically. our mac protocol can sleep and listen circularly to satisfy the goal of energy saving. in the consideration of the design the software of layers of network and application, we bring forward an idea to fulfill the function of routing and data fusion
在設計過程中,本文首先基於ieee802 . 15 . 4標準,對物理層和mac層需要符合的標準的ieee802 . 15 . 4協議增加了定時器的自動維護工作,從而形成了我們自己的物理層、 mac層協議,解決了節點的媒體訪問和定時休眠、監聽控制,達到了節能的目的;本文在網路層和應用層協議設計中,提出了路由表維護和數據融合的思想,並進行了設計的實現。In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed
本文對全國住房公積金監督管理信息系統網路安全體系進行設計,包括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與訪問控制和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice
在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。This paper mainly introduced switcher realization scheme. and this paper traversed store - and - forward technology, medium access control and physics sublayer technology, which are the keys technologies of fast ethernet switcher
論文主要介紹了快速以太網交換機的實現方案,並詳細講述了實現快速以太網交換機的存儲轉發技術、介質訪問控制技術和物理層技術等關鍵技術。It becomes more difficult to manage, integrate and share the control system real - time data when we set up the industrial real - time database because of complicated affair between every department and isomeric character of the system. a three - level - structure model and the method to establish database is provided based on corba criterion with its character of being regardless of programming languages, hardware platform and network protocol. a universal real - time database faces multi - system is also set up by learning the distributed criterion, it can realize the request broker, and the application software can visit the database pellucidly ; thus the power station simulation model can be linked with the control system such as infi90, ovation and be made use of the control object, a closed simulation and control experiment system is set up
在創建工控領域實時數據庫時,企業各部門間的復雜事務及內部異構性給實時數據的管理、集成和共享帶來了一定的困難,根據corba規范具有語言無關性、平臺無關性和網路協議無關性的特點提出基於分散式計算規范corba的三層體系結構模型及建立與維護實時數據庫的方法和途徑;通過corba規范建立面向多個分散控制系統的通用實時數據庫,實現數據訪問代理,使應用軟體可以透明地對實時數據庫進行訪問、存取、管理;將infi90 、 ovation分散控制系統與火電廠模擬機模型進行有效的互連,以全物理過程模擬數學模型為對象,構建了閉環控制模擬實驗研究系統,實現數據的高效連通及管理;進而通過基於corba的實時數據庫構建一個從火電廠模擬機對象到過程式控制制設備再到sis系統的綜合自動化試驗平臺。Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities
首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控制、通信加密、數據保護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市電子政務信息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "
根據涉密信息網路對安全的特殊性,根據國家對涉密信息網路安全的相關規范,筆者對x所的信息網路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照信息系統安全工程的方法設計了針對該所整個信息網路系統物理安全、網路運行安全、信息安全保密以及安全保密管理等方面的解決方案,完成了網路安全域劃分、防電磁泄漏、安全審計、網路安全管理、信息傳輸加密和訪問控制等工作。What ' s more, with fundamental research, the following solutions were put forward : database connectivity technology, which can help to implement this system which works in client / server mode, the way of using ole ( object linking and embedding ) to solve the storage and retrieval problems of blob ( binary large object block ) data type and the method of directly giving the database system ' s operating purviews to right users with the application of dbms ' s authentication mechanism, which help to control database ' s access
這些關鍵技術包括數據庫連接技術,以實現客戶/服務器模式下的數據庫開發;用ole技術解決大文本數據存取問題;結合dbms自身鑒別機制,將數據庫系統權限賦予用戶,以控制用戶對數據的訪問。最後,本文對南京物流公司管理信息系統的開發工作進行了總結,並展望了開發運輸類公司mis的發展方向。Information technology - telecommunications and information exchange between systems ; local and metropolitan area networks ; specific requirements - part 15. 3 : wireless medium access control and physical layer specifications for high rate wireless personal area networks
信息技術.系統間遠程通信和信息交換.局域網和城域網.特殊要求.第15 . 3部分:高速率無線個人區域網用無線媒體訪問控制和物理層規范Information technology - telecommunications and information exchange between systems ; local and metropolitan area networks ; specific requirements - part 15. 4 : wireless medium access control and physical layer specifications for low - rate wireless personal area networks lr - wpans
信息技術.系統間遠程通信和信息交換.局域網和城域網.特殊要求.第15 . 4部分:低速率無線個人區域網用無線媒體訪問控制和物理層規范In ejb container, entity bean is encapsulated by session bean, which nomalizes access of consumers, reduces coupling between business container and consumers, centralizes security manage and
在業務層,以會話bean封裝實體bean ,規范化客戶訪問,減少業務層和客戶端的耦合,集中安全管理和事物控制,提高了性能。With the flourish of wlan market, people are concerned about the wlan security more than ever. data transmitted in wlan over high frequency radio is subject to eavesdropping, furthermore, physical media access control measures do n ' t adapt to wlan
在無線局域網市場急速擴大的同時,人們對其安全問題愈發關注:無線局域網中的數據通過高頻無線電波傳輸,極易遭到竊聽,而且在無線網環境中,難以應用有線網路的物理訪問控制手段。The architecture of grid file system services specification spells out the hierarchical structure to facilitate federation and sharing of virtualized data from file systems in the grid environment by providing the virtual namespace that will allow association of access control mechanisms and metadata of the underlying physical data sources
Architecture of grid file system services規范通過提供虛擬命名空間來制訂層次結構(這樣可以在訪問控制機制和底層物理數據源的元數據之間建立關聯) ,從而促進網格環境中文件系統中虛擬數據的聯邦和共享。When implementing the access controlling service, it is very essential to authenticate peers rapidly and correctly
在物理隔離技術實施訪問控制過程中,必須對通信實體進行準確高效的身份認證。The safety refers to four layers : the physical layer, the network layer, the system layer and the application layer, which includes many contents such as network insulation, encryption, safety detection and monitoring, safety audit, virus protection, access control, identity certification, data copy and recovery, security management, etc. starting with the application layer of safety system, this article, based on j2ee, researches the privacy protection, completeness, facticity, availability and controllability of information in e - government
其安全性涉及到物理級、網路級、系統級和應用級四個層次,具體包括網路隔離、加密、安全檢測與監控、安全審計、防病毒、訪問控制、身份認證、數據備份與恢復、安全管理等幾十項內容。此課題從安全體系的應用層出發,基於j2ee技術,對電子政務系統中信息的保密性、完整性、真實性、可用性和可控性等方面進行研究。分享友人