特權訪問控制 的英文怎麼說

中文拼音 [quánfǎngwènkòngzhì]
特權訪問控制 英文
access control private
  • : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 特權 : privilege; prerogative
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種的增強型安全設計原則,基於此原則建立了管理授和推薦式授的安全,用以提高系統的安全性,並大大減少授管理維護量;研究了殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的
  2. Internet security - controls user access to sites or internet, can give different access privileges

    網安全-站點或網路的用戶,可授予不同的限。
  3. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全性策略配置目標包括對數據的原始、保護內核和系統軟體的完整性、防止有的進程執行危險的代碼,以及限由有的進程缺陷所導致的傷害。
  4. Emphasizes controlling access through least privilege and compartmentalization principles 4 and 5, respectively

    強調對通過最小(原則4 )和分隔(原則5 )的進行
  5. In this model we divide system into several sub - layers, and strictly control visiting popedom in order to assure the system ' s high cohesion low coupling, good maintainability, easy expansibility, being good transplantable, etc

    該模式對系統的層次進行了詳細的劃分,並對各層次之間的限進行了嚴格的。確保系統具有高內聚、低耦合、易維護性、可擴展性和可移植性強等點。
  6. Access control private

    特權訪問控制
  7. This thesis analyzes the features of organization management and privilege management in wfms. the author introduces the role and task based access control ( r & tbac ) model to wfms. the author also designs a tree - structure organization structure which

    在分析工作流管理系統中的組織管理和限管理的點之後,本文引入基於角色和任務的( r & tbac )模型,並設計了樹型組織結構圖,能更好的組織角色、構造角色層次,最後使用mvc模式進行設計並利用struts等框架進行具體實現。
  8. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態性外,在不需要限遞增假設下,實現了用戶對文件的多種限,並大大減小了溢出題的發生可能
  9. It provides fine grained access control, using a local name space hierarchy, and a simple, flexible, trust policy model ; these features allow for the ability to create groups and delegate authorizations. finally, it is proposed that an spki certificate based payment system that offered a

    Spki / sdsi為使用者提供了細粒度的手段,它使用局部名字空間和一個簡單、靈活的信任策略模式,這些性使得可以創建組結構和進行授代理。
  10. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ), mandatory access control ( mac ) and least privilege management. finest granularity dac allows that the owner of an object can choose to grant access permission to any other user

    本論文主要在文件管理這兩方面對linux的安全性進行增強,即實現了細粒度的自主、強、以及最小管理。
  11. Message queuing code access security defines queue - specific operations or queue access that an application might require which is subject to security control ; it does not represent a right for the application to perform these operations or receive access in and of itself

    消息隊列代碼安全性定義應用程序可能需要的隊列定的操作或隊列(受到安全約) ;它不代表應用程序由其本身自行執行這些操作或接收限。
  12. Presents platform sdk recommendations about privileges, buffer overruns, discretionary access control lists dacls, and passwords

    介紹有關的platform sdk建議,包括、緩沖區溢出、任意列表( dacl )和密碼。
  13. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體和編流程進行詳細分析,根據其「幾上幾下」的點,並結合未來「網運分離」體改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的限和數據安全題,提出以視圖模式結合用戶識別限審定實現數據限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入題,詳細討論綜合採用差錯、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
分享友人