訪問控制權限 的英文怎麼說
中文拼音 [fǎngwènkòngzhìquánxiàn]
訪問控制權限
英文
access control right- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 控 : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
- 制 : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
- 權 : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
- 限 : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
- 訪問 : visit; call on; interview; access; addressing; reference to
- 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
- 權限 : limits of authority [powers]; power; authority; within the power or right of; jurisdiction; compe...
-
The users are managed based on roles and grades, the types of users are : anonym, student, teacher and administrator, implement secure management by setting access control privilege specially
用戶管理採用基於角色的分級管理模式。將用戶主要分為匿名用戶、學生、教師和管理員四種類型,通過對其分別設置訪問控制權限來實現安全訪問和管理。One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority
摘要基於角色訪問控制( rbac )技術的一個重要概念就是角色,通過在用戶和訪問權限之間增加一個角色層,使得權限控制更為簡單且靈活有效。Allows control of code access security permissions
允許控制代碼訪問安全權限。6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data
6 )採用嚴格的訪問控制方式與權限管理機制。 fsca系統充分保證了用戶數據訪問的合法性與有效性。It checks the access control list of the. aspx or. asmx handler file to determine whether a user should have access to the file
它檢查. aspx或. asmx處理程序文件的訪問控制列表( acl )以確定用戶是否應該具有對文件的訪問權限。From document level actions, privileges with fine granularity such as create, read, update, delete, print, annotation modify, to resource manager collection access control, ibm db2 content manager ensures proper access and use
從文檔級動作,創建、讀取、更新、刪除、列印的細粒度權限和注釋修改,到resource manager集合訪問控制, ibm db2 content manager都可以保證正確實現訪問和使用。Traditional access control model hardly consider the issue of subjects ' trust worthiness and privilege partition
傳統訪問控制模型在授權過程中沒有考慮主體的信任度和權限集合劃分等問題。Permissions are set using access control lists
權限是使用訪問控制列表設置的。Class with the specified identity reference, access control type, and extended right identifier
使用指定的標識引用、訪問控制類型和擴展權限標識符來初始化This thesis analyzes the features of organization management and privilege management in wfms. the author introduces the role and task based access control ( r & tbac ) model to wfms. the author also designs a tree - structure organization structure which
在分析工作流管理系統中的組織管理和權限管理的特點之後,本文引入基於角色和任務的訪問控制( r & tbac )模型,並設計了樹型組織結構圖,能更好的組織角色、構造角色層次,最後使用mvc模式進行設計並利用struts等框架進行具體實現。Class with the specified identity reference, access control type, extended right identifier, active directory security inheritance, and inherited object type
使用指定的標識引用、訪問控制類型、擴展權限標識符、 active directory安全繼承和繼承對象類型來初始化When computing effective permissions entitlements for bob cached in explicitentitlementscache, the portal access control component leverages existing cache values from the childresourcescache and rolemappingcache
:在計算bob的有效權限或(權利) (在explicitentitlementscache中緩存)時,門戶訪問控制組件利用childresourcescache和rolemappingcache中現有的緩存值。Critical transaction set and task authorization indicator are introduced to allow for finer granular permission control, thus some problems of complex constrains such as history - based separation of duty can be solved effectively, and this provide a good base for active access control
通過引入臨界事務集合和任務授權指示符,實現了細粒度的權限控制,能夠較好地解決基於歷史的職責分離之類的復雜約束問題,並為主動訪問控制奠定了基礎。After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method
作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出問題的發生可能The system checks the access control entries in sequence until it finds one or more that allow all the requested access rights or until any of the requested access rights are denied
系統按順序檢查訪問控制項,直到找到一個或多個允許所有請求的訪問權限的項,或者直到所有請求的訪問權限均被拒絕。In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice
在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。In access control apopular form of knowledge test for access control. a password is a string of alphanumeric data or a phrase that must be entered int o a system to gain access to a physical area or a resource
存取控制中一種測試訪問控制權的常見方式,口令是由字母和數字組成的字元串或短語,它們必須輸入系統以獲得某一實際區域或資源的使用權限。Support a large numbers of users ? since wireless carriers and portals support millions of subscribers, the wireless platform must provide facilities to centrally manage / provision these users, their security and access control privileges, and their ability to personalize services
支持大量用戶? ?因為無線運營公司和門戶支持上百萬的用戶,所以無線平臺必須提供工具來集中管理配置這些用戶、用戶安全和訪問控制權限,以及用戶個性化服務的能力。In addition to sql server service startup accounts, access control permissions may have to be granted to built - in accounts or other sql server service accounts
除sql server服務啟動帳戶外,可能還必須向內置帳戶或其他sql server服務帳戶授予訪問控制權限。Second, in according to the application security needs, the set of discretionary access permissions has been extended to twelve permissions, such as create / delete / getattr / setattr. these additional permissions have been added and implementation defined for different objects
二、針對不同類型的客體,根據實際需要,將訪問控制權限由原來的讀、寫、執行細化到創建、刪除、讀取屬性和修改屬性等12種。分享友人