訪問控制包 的英文怎麼說

中文拼音 [fǎngwènkòngzhìbāo]
訪問控制包 英文
acl
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性題,尤其是用戶題;接著介紹了幾種浙江大學博士學位論文典型的方法,括強、任意、基於角色的、基於任務的,以及基於公司關系的、基於企業聯盟的等;在前面描述的典型模型基礎上,給出了一個網路化製造系統的綜合模型,括網路化製造系統的用戶和資源層次關系圖、參考模型和過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的描述語言。
  2. So the clients are no longer just browsers ; they are web services clients that interact with application services across administrative domains, and those application services can then call back to the shibboleth services of the client to obtain attributes that can be used for the access control authorization requirements

    因此,客戶機不僅僅是瀏覽器;它們括web服務客戶機,可以與跨管理域的應用服務進行交互,這些應用服務然後可以回調客戶機的shibboleth服務,從而獲取可用於授權需求的屬性。
  3. The idea to build up such a model originates from that of " web of trust " model of pgp mixed up with that of the delegation model of spki, as well as its resulted access control strategy by the combinations of trust and delegation policies

    「復合模式」思想含兩層含義:一方面是它採用了將pgp以用戶為中心的信任模式和spki授權證書機相結合;另一方面是它實現的策略基於信任策略和授權策略的有機組合。
  4. Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example, station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address. " see ieee 802. 1x specifications, page 21, section 7. 9, lines 34 - 39, available to link to in the

    在不支持使用安全關聯的共享媒體環境中進行使用eapol的嘗試會導致基於埠的網路極易受到攻擊;例如,工作站a只要發出一個使用工作站b的個體mac地址的eapol - logoff,就能夠在工作站b上掛裝一個成功的拒絕服務攻擊。 」
  5. The r - gss model is composed of three components as follows : access control decision server ( acds ), ldap directory service server and access control execution server ( aces )

    利用域管理,簡化了rbac模型的實現難度。整個系統括三個部分:決策子系統、 ldap目錄服務器和實施子系統。
  6. This dissertation mainly introduces the key technology and innovative research of ws - dfs, such as web - based architecture, flexible component model, distributed local file storage unit, parallel access control and high efficiently organize and index for huge amount data

    本文主要論述基於web服務的分散式文件服務系統的關鍵技術及創新研究,括體系結構、靈活的組件模型、全分佈的本地文件存儲單元、數據並發和海量數據高效的組織和檢索等六個方面的研究成果。
  7. When you get the set of all audit rules for a mutex, the set contains the minimum number of rules currently required to express all the access control entries

    在獲取某個mutex的所有審核規則的集合時,該集合含當前表示所有項所需要的最低數量的規則。
  8. When you get the set of all audit rules for an event, the set contains the minimum number of rules currently required to express all the access control entries

    在獲取某個事件的所有審核規則的集合時,該集合含當前表示所有項所需要的最低數量的規則。
  9. 2. a comprehensive framework is developed for the above model. those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on

    完整設計了模型的整個可實現框架:括各組成模塊的功能、相關數據結構和消息編碼格式、證書管理庫和密鑰環的設計,以及具體的流程等。
  10. Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic

    以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:數據鏈路層和物理層,並將其細分為一些功能子層,括數據鏈路層的llc (邏輯鏈路)子層和mac (介質)子層,物理層的pcs (物理編碼子層) 、 pma (物理介質附加子層)和pmd廈門大學碩士學位論文摘要(物理介質相關于層) 。
  11. In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed

    本文對全國住房公積金監督管理信息系統網路安全體系進行設計,括對物理安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。
  12. The system makes a network security access mechanism suitable for user ' s security policy, including three parts : package filtering router : offering security access control in network layer ; proxy server : used for security access on application layer ; authentication server : used for authentication of user ' s identity

    根據該模型,本文設計了一個防火墻原型系統,該系統提供了一個適合用戶安全策略的網路安全,它由以下三個部分組成:過濾路由器,用來提供網路層一級的安全;代理服務器,用來提供應用層一級的;認證服務器,用來提供用戶身份認證。
  13. File management has the function of 2 - level password management, including passwords of developers and users. this function allows developer to manage the access right to hardware and issue different access control rights to different users. 1

    檔管理系統具有2級密碼管理功能,括開發商口令和用戶口令,開發商可以使用此功能對硬體的許可權進行管理,可以對不同的用戶開放不同的許可權。
  14. The network security mechanism has several essential factors : authentication, authorization, integrality, non - repudiation and confidentiality. authentication is very important and basic security service. and other security services all depend on it

    網路安全機的基本要素括:身份認證、授權、完整性檢測、防否認機、可靠性保護,而身份認證在安全系統中的地位極其重要,是最基本的安全服務,其它的安全服務都要依賴於它。
  15. Software system comprises some main subsystems such as the tss embedded os, host interface specification, file access control module, explicit authorization table management and audit system

    軟體系統括tss的嵌入式操作系統、介面協議、文件模塊、顯式授權程序、靜態授權表的管理,以及審計系統等重要的子系統。
  16. The number of access control entries aces this

    對象可含的項( ace )的數量。
  17. The paper contains all kinds of knowledge related to the system, including maxwell electromagnetic theory, pattern of optical radiation in space, channel model of atmosphere communication, computer communication protocols, wireless lan communication protocols, medium access control protocol, carrier sense multiple access / collision detection protocol, manchester coding theory, pulse position modulation coding theory and so on

    主要括: maxwell電磁理論;發送光場模型;空間通道模型;計算機網路通信技術:無線局域網通信技術;媒體規程( mac ) ;載波檢測多址接入碰撞檢測規程( csma cd ) ;曼徹斯特編碼與ppm編碼技術等。
  18. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,括;身份認證、密碼、、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,定了行之有效的規章度。
  19. Secure operating system places its focus on controlling user ’ s access to prevent illegal operations, marking the user and authentication to guarantee the security and integrality. access control technology plays an important role to enforce operating system security. now, research on access control in embedded real time operating system ( ertos ) is just at the prime stage

    操作系統安全的主要目標括根據系統安全策略對用戶的操作進行,防止其對計算機資源的非法存取;標識用戶並進行身份鑒別;保證操作系統運行的安全性;保證系統自身的安全性和完整性。
  20. Then, the application framework found on warbac model, referring to the access control framework of x. 812 | iso 10181, is given, and its designing technology is probed into particularly. mainly including the application system framework based upon warbac model, the design concerning tactic, performance function, decision - making function, communication mode and management of access control of warbac and the service based on ldap, etc. at the end of the paper, a realized file management system - ujsfwm, originating from the application framework of warbac model, is illustrated the function of the ujsfwm system and the realization of the concerning technology are explained at length in the paper

    接下來給出了參照x . 812 | iso10181架構設計的基於warbac模型的應用框架,並對其設計技術進行了詳細的探討,主要內容括:基於warbac模型的應用框架體系結構, warbac策略設計、執行功能和決策功能及其相互間通信方式設計、 warbac管理功能設計、基於目錄管理的ldap服務等。最後介紹了根據基於warbac模型的應用框架進行設計實現的文件資源管理系統? ? ujsfwm ,文中對ujsfwm系統的功能及其涉及到的相關技術的實現做了詳細介紹。
分享友人