調整訪問控制 的英文怎麼說

中文拼音 [diàozhěngfǎngwènkòngzhì]
調整訪問控制 英文
adjusting access control
  • 調 : Ⅰ動詞1 (配合得均勻合適) harmonize; suit well; fit in perfectly 2 (使配合得均勻合適) mix; adju...
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 調整 : adjust; tune up; trim; trimming; variation; modulation; arrangement; debug; rectification; redres...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. However, the farther analysis in the paper indicates that the strategy of parameter configuration in current connection pool technique is static state with 1 - order enactment while initializes connection pool without self - optimized adjustment according as the variety of application demand, the operation results of high use frequency database are not cached and users visit the same database independently. the multi - propose connection strategy cannot control the database operation for the same transaction and cannot ensure the acid attribute, etc. in according with the defections mentioned above, the service technique of self - optimized connection pool is presented in this paper and the composing structure for self - optimized connection pool is designed, then, some strategy in dynamic parameters adjustment, transaction management and data cache for connection pool is improved

    然而,通過本文的研究分析,現有數據庫連接池技術的參數配置策略是靜態的,連接池初始化時進行一次設定,不能根據應用需求的變化而動態調;連接池的核心管理機中,沒有對使用頻率較高的數據庫操作結果進行緩存,多個用戶依然各自獨立地完成相同的數據庫;使用的連接復用策略無法屬于同一個事務的多個數據庫操作,不能保證事務的acid屬性等。
  3. Furthermore, field - level access control can adjust a structure based on the roles of the current user

    此外,欄位級的可以基於當前用戶的角色來調結構。
  4. If the technicians applied technology in the wrong, even achieving the business logic, but probably leading to many vices including low performance, low scalability, close coupling, low software duplication. so how to assemble the j2ee technology reasonable and achieve a system with high performance and high expansibility is my research emphasis in the thesis. in order to solve the problems and implement efficient web application, the paper put forward ejs _ mvc model according mvc pattern and we can assemble component by using ejs _ mvc model, it can solve many problems of web application and improving system with clear flow and clear function partition, in addition, due to controller is the most importance in the ejs _ mvc model, so the thesis also discuss some problems about controller design ; if the model is not designed accurately, system performance will encounter fatal influence, so the article lucubrate ejb technology from ejb choice, ejb optimized design, database access, design pattern etc and bring forward some strategies and methods about how to build efficient business tier ; finally based on ejs _ mvc model, a example that contains simple business logic is developed according to the object - orient software engineering thinking and some strategies and methods proposed by the thesis, in the process of achieving system function, the emphasis is probing into how t o assemble and apply technology reasonable and providing a new thinking thread and method contributing to build high effective and flexible j2ee application

    由於j2eeweb應用是由組件組成,因此為了解決上述題,實現高效的應用,本文首先從如何合理組合組件入手,找到一種方法使各組件能具體分工而又緊密合作,在深入研究各組件基礎上,根據mvc模提出了ejs _ mvc模型概念,指出可按此模型組合各層組件,該模型可以解決傳統web開發中存在的題,而且具有系統流程與系統功能劃分清晰,可擴展性、可維護性強等優點,另外由於器是ejsmvc模型的重中之重,它起到承上啟下的作用,它設計好壞直接關繫到個應用的性能、伸縮性與擴展性,因此又探討了器設計的有關題;另外如果模型設計不當的話,對系統性能造成的影響可能是致命的,因此本文又從ejb組件選擇、 ejb調優設計、數據庫和設計模式等方面對ejb技術作了全面的分析研究,指出在業務層中如何避免太多網路遠程調用和提高業務層性能,特別是根據前面的分析總結出了業務層的優化分層組合模型,這個模型的使用無疑會使業務層具有較高的性能與伸縮性;最後選擇一個業務邏輯較簡單的系統,使注意力集中到運用的j2ee技術上來,按照ejs _ mvc模型與軟體工程流程以及本論文所提出的方法與策略實現業務邏輯,在實現過程中具體探討如何合理運用組合技術,就多層j2ee體系結構的設計思想作深入的探討實踐,為實現高效、靈活的多層j2ee應用提供一種新的思路及方法。
  5. The structure of the system can be adjusted dynamically. the more important is that it makes full use of network bandwidth. it controls the use of network resource through token - control, decreases resource waste causing by access conflict in ethernet communication and achieves high - speed real - time data transmission

    基於虛擬令牌和以太網的實時網路協議一方面為上層調用軟體提供了一個透明的可動態調系統結構的數據傳輸體系,更重要的是它充分利用了網路帶寬,以令牌方式網路資源的使用,降低了以太網通信中沖突引發的資源浪費,從而實現了實時高速的網路數據傳輸。
  6. Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "

    根據涉密信息網路對安全的特殊性,根據國家對涉密信息網路安全的相關規范,筆者對x所的信息網路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照信息系統安全工程的方法設計了針對該所個信息網路系統物理安全、網路運行安全、信息安全保密以及安全保密管理等方面的解決方案,完成了網路安全域劃分、防電磁泄漏、安全審計、網路安全管理、信息傳輸加密和等工作。
分享友人