資源訪問安全 的英文怎麼說
中文拼音 [zīyuánfǎngwènānquán]
資源訪問安全
英文
resource access security- 資 : Ⅰ名詞1 (錢財; 費用) money; wealth; expenses 2 (資質) intelligence; endowment 3 (資格) quali...
- 源 : 名詞1. (水流起頭的地方) source (of a river); fountainhead 2. (來源) source; cause 3. (姓氏) a surname
- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 資源 : natural resources; resource
- 訪問 : visit; call on; interview; access; addressing; reference to
-
The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac
本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。Condor - g integrates condor ’ s eximious job management functions into globus ’ secure communication among domains protocol and standard remote batch process system access protocol, and help the condor users to use globus resources
Condor把自身出色的作業管理功能和globus的域間安全通信協議及遠程批處理系統的標準化訪問協議相結合,就形成了condor - g軟體系統,使得condor系統的用戶也可以很方便的使用globus資源。These measures include how a user to log in manufacturing application system under web pages, how to control the resource access on the same web page, how to control the divulgence of the anchor link information of the hyperlink and how to control browser bookmark function ' s access to old pages
( 3 )提出了基於web頁面方式的製造應用系統用戶界面下,用戶的安全登錄、對同一個頁面上的資源訪問進行控制、控制超鏈接錨點鏈接信息的泄漏、控制瀏覽器書簽功能對頁面的訪問等頁面資源訪問控制安全措施。Applications in the same cell, even with global security and java 2 security enabled, can potentially compromise other applications in the same cell by accessing resources of those applications or altering the cell configuration
在同一個計算單元中的應用程序(即使啟用了全局安全性和java 2安全性)可能會通過訪問其他應用程序的資源或改變計算單元配置,從而潛在地破壞The resource manager control bits contain information specific to the resource manager accessing the security descriptor
資源管理器控制位包含特定於訪問安全性說明符的資源管理器的信息。Security - critical code is any code that protects sensitive resources and exposes brokered access to the resource to untrusted or partially trusted code by performing the necessary elevation of privilege operations
安全性關鍵型代碼為具有以下性質的任何代碼:這些代碼保護著敏感資源,並通過執行必要的特權提升操作將經過調整的資源訪問權限公開給不受信任或部分受信任的代碼。Running your application in full trust makes it easier to access resources on the local computer, but exposes your application and its users to high security risks if you do not design and develop your application strictly according to the secure coding guidelines topic
以完全信任權限運行應用程序將使訪問本地計算機上的資源變得較為容易,但如果沒有嚴格按照「安全編碼指南」主題中的要求設計和開發應用程序,則會讓應用程序及其用戶暴露在高安全風險下。Jaas provides a flexible, declarative mechanism for authenticating users and verifying their ability to access secure resources
Jaas提供了一種靈活的、說明性的機制,用於對用戶進行認證並驗證他們訪問安全資源的能力。It gives users secure access to data, it resources, transactions, and processing power that were previously locked up in proprietary systems, so they can better address their clients needs.
它使用戶可以安全地訪問數據、 it資源、事務以及先前被限制在私有系統上的處理能力,因此,那些公司可以更好地滿足客戶的需求。 」Code that does not originate from the local computer and is therefore likely to be less trustworthy receives restricted access to protected resources under the default security policy
在默認安全策略下,不是出自本地計算機的代碼(因而可信任度可能較低)會收到對受保護資源的受限制的訪問權。Thirdly, the paper analyzes how to carry out cwiss security, such as single - sign on, the rules and implementing in accessing resources and authorizing
再次,對校園網安全性實現問題,如單點登錄、資源訪問授權的規則與實施等問題進行了詳細的闡述和分析。Access control is a very important part of the security of operating system. access control is to control the access of objects by the identity of theuser, which is based on the identification and authentication mechanism
訪問控制是操作系統安全保護中極為重要的一環,它是在標識與鑒別的基礎上,根據用戶身份對其提出的資源訪問請求加以控制。Contemporary, with the basic of ca authentication, digital signature, public - key cryptography and secret - key cryptography, this thesis bring forward a basic model of user registration and c / s, b / s resource accessing under the mechanism that using cryptography to transfer and memory the user ' s password
同時,在結合pki模式中ca認證、數字簽名以及公開密鑰與對稱密鑰演算法技術的基礎之上,提出了密文傳輸和存儲口令機制下的用戶注冊和c s 、 b s模式資源訪問的基本模型,以實現c s和b s的安全機制。Security trust levels in accessing resources
>訪問資源時的安全信任級別The success or failure of the resource access attempt is determined purely by operating system - level security
資源訪問嘗試成功還是失敗完全由操作系統級別的安全性決定。To safely manipulate the kernel queue data structures ? that is, in order to ensure thread synchronization ? your code should acquire the appropriate lock ( i. e., resource access control ) first
為了安全地操作內核隊列數據結構- -換句話說,為了確保線程同步- -你的代碼應當首先獲取合適的鎖(也就是資源訪問控制器) 。This paper analyses the access control research actuality and problems for active node resources, and designs the safety and security architecture of access control for active node resources, and bring forward the access control mechanism for active nodes resource
文章詳細分析了主動節點資源訪問的研究現狀和存在的問題,設計了主動節點資源訪問安全體系,提出了一種新的主動節點資源訪問控制機制。The cisssps adopts three - layer - structure design conforming to j2ee standard, which internally includes platform modules such as search engine, application install management, data management, resources management, safety control etc. and externally provides unified connecting points for information service, unified customer identity attestation, authorization management and access control
四川公安綜合信息查詢系統採用符合j2ee標準的三層架構設計開發,內部包含查詢引擎、應用配置管理、數據管理、資源管理、安全控制等平臺化組件;對外提供統一的信息服務接入,統一的用戶身份認證、授權管理和訪問控制。19 czajkowski k, foster i, kesselman c. agreement - based resource management. in proc. the ieee, 2005, 93 : 631 - 643
Gt4核心組件在一個公用框架內解決了與以下方面有關的一些基本問題:安全資源訪問資源管理數據傳輸資源發現等。分享友人