訪問控制策略 的英文怎麼說

中文拼音 [fǎngwènkòngzhìlüè]
訪問控制策略 英文
access control policy
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 (通「冊」 古代寫字用的竹片或木片) bamboo or wooden slips used for writing on in ancient ...
  • : Ⅰ名詞1 (簡單扼要的敘述) summary; outline; brief account; résumé: 節略 memorandum; aide mémoire;...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  • 策略 : 1 (制定的行動方針和斗爭方式) tactics 2 (講究斗爭藝術) tactful 3 [數學] (對策) policy; strat...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. An access control policy suitable for mis

    一種適用於管理信息系統的訪問控制策略
  3. The idea to build up such a model originates from that of " web of trust " model of pgp mixed up with that of the delegation model of spki, as well as its resulted access control strategy by the combinations of trust and delegation policies

    「復合模式」思想包含兩層含義:一方面是它採用了將pgp以用戶為中心的信任模式和spki授權證書機相結合;另一方面是它實現的訪問控制策略基於信任和授權的有機組合。
  4. Introduce the multi - direction accessing schedule named " transparent mapping of the memory address ", which supports the direct access to sram of multi - dsp

    並提出了vvp功能子系統「存儲區地址全透明映射」的多向訪問控制策略,以支持多層次插板模塊。
  5. The model is also applicable for xml schema documents. a flexible and practical method to enforce discretionary access control ( dac ) policy on xml documents is presented in this paper

    2 )提出了一種靈活實用的方法對xml文檔實施自主訪問控制策略,該方法基於功能強大的xml模式而不是傳統的dtd技術。
  6. Then, the application framework found on warbac model, referring to the access control framework of x. 812 | iso 10181, is given, and its designing technology is probed into particularly. mainly including the application system framework based upon warbac model, the design concerning tactic, performance function, decision - making function, communication mode and management of access control of warbac and the service based on ldap, etc. at the end of the paper, a realized file management system - ujsfwm, originating from the application framework of warbac model, is illustrated the function of the ujsfwm system and the realization of the concerning technology are explained at length in the paper

    接下來給出了參照x . 812 | iso10181架構設計的基於warbac模型的應用框架,並對其設計技術進行了詳細的探討,主要內容包括:基於warbac模型的應用框架體系結構, warbac訪問控制策略設計、執行功能和功能及其相互間通信方式設計、 warbac管理功能設計、基於目錄管理的ldap服務等。最後介紹了根據基於warbac模型的應用框架進行設計實現的文件資源管理系統? ? ujsfwm ,文中對ujsfwm系統的功能及其涉及到的相關技術的實現做了詳細介紹。
  7. Overall organizational structure and access control policies

    整個組織結構和訪問控制策略
  8. Access control policies for web based library management system

    的圖書館管理系統訪問控制策略
  9. This thesis proposes a role - based access control policy frame

    文章提出了基於角色的訪問控制策略框架。
  10. On the realization of unisiting control strategy of lan by using java programs

    小程序實現局域網的訪問控制策略
  11. How to enforce mandatory access control ( mac ) policy on xml documents is first proposed

    3 )首次討論了在xml文檔中實施強訪問控制策略的方法。
  12. Community authorization services for creating credentials with inherent access control policies

    社區授權服務(用於創建具有集成訪問控制策略的證書)
  13. Access control designer is a universal modular tool for visually designing access control policies

    設計器是為虛擬設計訪問控制策略提供的一個通用模塊。
  14. This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic

    並提出利用權能對資源訪問控制策略進行描述,動態維護。
  15. The validation of xml documents under mac policy is defined to improve the usability of systems processing valid documents

    定義了強訪問控制策略下xml文檔的有效性,提高了處理有效文檔的系統的可用性。
  16. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的模型x - rbac ,同時為了區分xml數據庫中的合法和合理,我們根據數據庫具有頻繁性這一特徵,提出了一種基於區域密度的入侵檢測模型( ids ) ,以對隱藏在正常中的潛在安全威脅進行報警和日誌。
  17. Rcbac model introduces the context information and the group mechanism to the access control policies. in rcbac, the context information is used to control the user assignment and permission assignment dynamically and the group mechanism is used to simplify authorization further. thus, rcbac can implement the fine - grained access control and satisfy the enterprise ’ s demand for the unified resource access control

    在對rbac的一些改進模型分析研究的基礎之上提出了基於角色和上下文的模型( roleandcontext - basedaccesscontrol , rcbac ) , rcbac模型將上下文信息和組化機引入到訪問控制策略中,利用上下文信息動態地用戶分配和權限分配,利用組化機進一步簡化授權,實現了細粒度的,滿足了企業統一資源的需求。
  18. Operations on xml documents under mac policy are described in details. the polyinstantiation caused by these operations is also discussed. some implementing mechanisms for key models are given

    詳細地描述了如何實現強訪問控制策略下針對xml文檔的操作,並討論了可能引起的多實例情況和解決辦法,然後給出了一些關鍵模塊的實現機
  19. Based on detailed analysis of security framework of j2ee and jboss, the thesis gives description of security problem from data and data operation aspects, and provides a data transmission solution based on rmi plus ssl, a data access control solution based on wwwwwh ( who, where, when, what, which, how ) security policy. the real system provides the security solution through proxy, which not only assures the high security of the system, but also improves the flexibility of the system

    本文在分析了jzee和jboss的安全框架的基礎上,從數據與操作兩個方面對ip網路管理系統存在的安全題進行了剖析,並從數據安全和系統效率的角度提出了rmi + ssl的安全數據傳輸方案、基於wwwwwh ( who , where , when , what , which , how )的訪問控制策略,並以安全代理模式實現了上述解決方案,從而不僅保證了數據傳輸和的高安全性,也加強了系統的靈活性。
  20. Based on the analysis of the concurrent control strategy to replicated structure, an optimism concurrent control model is presented, accordingly an effective concurrent control algorithm is described to preserve the operation intention, and more cooperative capability in practice is put up

    本文在基於復結構的並發分析的基礎上,提出了並發訪問控制策略模型,並給出了一個有效的適合繪圖對象並發演算法,在實際應用中表現出較好的協作性能。
分享友人