訪問控制 的英文怎麼說

中文拼音 [fǎngwènkòngzhì]
訪問控制 英文
ac access control
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The repositories are called access control lists acls

    這種資料庫稱為訪問控制鏈表( acl ) 。
  2. The users are managed based on roles and grades, the types of users are : anonym, student, teacher and administrator, implement secure management by setting access control privilege specially

    用戶管理採用基於角色的分級管理模式。將用戶主要分為匿名用戶、學生、教師和管理員四種類型,通過對其分別設置訪問控制權限來實現安全和管理。
  3. Cebus - eib router medium access control sublayer

    Cebus - eib路由器媒體訪問控制子層
  4. The on - line isotope dew point measurer control scheme

    應用數字證書實現基於角色的訪問控制
  5. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。
  6. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的標識鑒別機增加了新的用戶安全屬性,即安全標簽和審計掩碼,以增加對安全操作系統下強存取訪問控制和審計機的支持。
  7. An access control policy suitable for mis

    一種適用於管理信息系統的訪問控制策略
  8. Only 56 bits of the original key appear in the permuted key

    我們是要將靈活而必要的訪問控制體系結構合併到linux中。
  9. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性題,尤其是用戶訪問控制題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  10. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全,用以提高系統的安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的
  11. Use role model to realize traditional access control

    用角色模型實現傳統訪問控制
  12. So the clients are no longer just browsers ; they are web services clients that interact with application services across administrative domains, and those application services can then call back to the shibboleth services of the client to obtain attributes that can be used for the access control authorization requirements

    因此,客戶機不僅僅是瀏覽器;它們包括web服務客戶機,可以與跨管理域的應用服務進行交互,這些應用服務然後可以回調客戶機的shibboleth服務,從而獲取可用於訪問控制授權需求的屬性。
  13. Notesaclentry represents a single entry in an access control list

    描述了一個訪問控制列表中的一個條目。
  14. The net result is that the eight groups of six bits are transformed into eight groups of four bits the four - bit outputs from the s boxes for 32 bits total. the final stage in the calculation of f is to do a permutation p of the s - box output to obtain the final value of f

    該服務器的se linux實現定義了一種混合的安全性策略,由類型實施( te ) 、基於角色的訪問控制( rbac )和可選的多級別安全性( mls )組成,所以廣泛用於軍事安全性中。
  15. Control and audit based on users under unix

    Unix下基於用戶的網路訪問控制和審計
  16. Fourth, design the whole access check strategy and the dac frame

    四、設計了自主訪問控制整體框架和安全檢查策略。
  17. One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority

    摘要基於角色訪問控制( rbac )技術的一個重要概念就是角色,通過在用戶和權限之間增加一個角色層,使得權限更為簡單且靈活有效。
  18. To append to the end of the access control list

    要追加到訪問控制列表末尾的
  19. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強訪問控制以及基於biba模型的強訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  20. This section describes the two most common access control and audit scenarios : setting rules at resource creation and programmatically modifying the rules of an existing resource

    本節描述兩種最常見的訪問控制和審核方案:在創建資源時設置規則和以編程方式修改現有資源的規則。
分享友人