訪問權限 的英文怎麼說

中文拼音 [fǎngwènquánxiàn]
訪問權限 英文
access authority
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 權限 : limits of authority [powers]; power; authority; within the power or right of; jurisdiction; compe...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. A securable item for which you want to control access

    要控制其訪問權限的安全對象。
  4. Determines access to securable objects

    確定對可保護對象的訪問權限
  5. One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority

    摘要基於角色控制( rbac )技術的一個重要概念就是角色,通過在用戶和訪問權限之間增加一個角色層,使得控制更為簡單且靈活有效。
  6. I d tighten up the java programming language s notion of access privilege as follows

    我建議對java編程語言的訪問權限概念做如下制;
  7. Remove the specified directory ( user access privileges permitting ) from the server

    從服務器上刪除指定的目錄,當然了,需要一定的用戶訪問權限
  8. Create a new directory on the server ( user access privileges permitting ) with the specified name

    在服務器上建立指定名稱的目錄(當然要以用戶訪問權限來決定) 。
  9. Internet security - controls user access to sites or internet, can give different access privileges

    因特網安全-控制站點或網路的用戶,可授予不同的訪問權限
  10. In asp. net, there are two ways to authorize access to a given resource

    在asp . net中,有兩種方式來授予對給定資源的訪問權限
  11. A system role assignment does not authorize access to items in the folder hierarchy

    系統角色分配並不授予對文件夾層次結構中的項的訪問權限
  12. There are two fundamental ways to authorize access to a given resource : file authorization and url authorization

    有兩種基本方式來授予對給定資源的訪問權限:文件授和url授
  13. Gets or sets a set of common access rights that map to both standard and object - specific access rights for reading, writing, and executing

    獲取或設置一組公共訪問權限,這些映射到標準和對象特定的訪問權限以用於讀取、寫入和執行。
  14. How to : remove access to source control files

    如何:移除對源代碼管理文件的訪問權限
  15. Is selected as the default access permission and

    作為默認的訪問權限,選擇
  16. This role contains default access permissions for any user that can access the database

    此角色包含了可以數據庫的任意用戶的默認訪問權限
  17. The sql server 2005 database engine sets file access permissions on the physical data and log files of each database to specific accounts

    Sql server 2005數據庫引擎為特定帳戶設置了對每個數據庫中的物理數據和日誌文件的文件訪問權限
  18. All protocols have equal access to the server

    所有協議都具有同等的服務器訪問權限
  19. To gain exclusive access to the queue

    獲得對隊列的獨占訪問權限
  20. Applications that define private securable objects can also use the generic access rights

    定義私有安全對象的應用程序還可以使用這些一般訪問權限
分享友人