訪問授權 的英文怎麼說

中文拼音 [fǎngwènshòuquán]
訪問授權 英文
access authorization
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 授權 : empower; authorize; warrant
  1. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當網路配置后,用戶就可以在任一internet終端實現對監控主機的和控制,以進行調度優化,遠程診斷與維護。目前,這套工業遠程信息監控系統已在省計算機重點實驗室進行了運行測試,系統工作正常,達到了預期要求。
  2. Enables the grantee to access metadata

    允許被元數據。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性題,尤其是用戶控制的題;接著介紹了幾種浙江大學博士學位論文典型的控制方法,包括強制控制、任意控制、基於角色的控制、基於任務的控制,以及基於公司關系的控制、基於企業聯盟的控制等;在前面描述的典型控制模型基礎上,給出了一個網路化製造系統的綜合控制模型,包括網路化製造系統的用戶和資源層次關系圖、控制參考模型和控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和的表達;最後我們給出了以xacml為基礎的網路化製造系統的控制描述語言。
  5. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種控制的增強型安全設計原則,基於此原則建立了管理和推薦式的安全機制,用以提高系統的安全性,並大大減少管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的
  6. So the clients are no longer just browsers ; they are web services clients that interact with application services across administrative domains, and those application services can then call back to the shibboleth services of the client to obtain attributes that can be used for the access control authorization requirements

    因此,客戶機不僅僅是瀏覽器;它們包括web服務客戶機,可以與跨管理域的應用服務進行交互,這些應用服務然後可以回調客戶機的shibboleth服務,從而獲取可用於控制需求的屬性。
  7. Grants view access to both the syndicators and subscribers views

    予對syndicators和subscribers視圖的查看
  8. Grants full access to both the syndicators and subscribers views

    予對syndicators和subscribers視圖和相關功能的完全
  9. This also grants read access to each syndicator and subscriber item that you have read access to

    予對您已具有讀的每個聯合和訂閱項的讀
  10. Also grants read, edit, or delete access to each syndicator and subscriber item that you have read, edit, or delete access to

    這還予對您已具有讀取、編輯或刪除的每個聯合和訂閱項的讀取、編輯或刪除
  11. That is, the messaging engine authorizes access to the queue based on the connection identity as we discussed earlier

    即,消息傳遞引擎將根據我們前面討論的連接標識對此隊列進行訪問授權
  12. Access authorization information like user names and passwords

    訪問授權信息(比如用戶名和密碼) 。
  13. Log in to enter credentials for authentication and account access authorization

    登錄以輸入認證和帳戶訪問授權的憑證。
  14. Any further access authorization is performed by ntfs file access permission s url authorization

    任何進一步的訪問授權均由ntfs文件限的url來執行。
  15. Any attempt to perform these tasks without the proper access authorization will result in an exception error

    在沒有適當訪問授權的情況下,任何執行上述任務的嘗試都將導致異常錯誤。
  16. Thanks to jaas we are able to identify users who access our system and restrict their access to the parts of the system they re authorized to use

    有了jaas ,我們就可以識別系統的用戶並限制他們只能訪問授權使用的那部分系統。
  17. Thirdly, the paper analyzes how to carry out cwiss security, such as single - sign on, the rules and implementing in accessing resources and authorizing

    再次,對校園網安全性實現題,如單點登錄、資源訪問授權的規則與實施等題進行了詳細的闡述和分析。
  18. A cas credential includes authorization assertions that describe the user s role in a community and can be used by end resources to grant access accordingly

    Cas證書包括了聲明,其中描述了用戶在社區中的角色,終端資源也可以使用它來進行相應的訪問授權
  19. Some web services behind multiple firewalls must access authorized internet resources that might be needed to complete the tasks of an activity or a set of activities

    多重防火墻后的一些web服務必需訪問授權的internet資源,他們可能需要這些資源來完成某個任務或一組任務。
  20. The thesis emphasize further research on both identity identification and authorization access based on role access control. a new identity identification protocol and a new method of access authorization are presented

    論文著重對身份認證和基於角色的存取控制進行了深入研究,並提出新的身份認證協議和訪問授權方法。
分享友人