資源訪問安全 的英文怎麼說

中文拼音 [yuánfǎngwènānquán]
資源訪問安全 英文
resource access security
  • : Ⅰ名詞1 (錢財; 費用) money; wealth; expenses 2 (資質) intelligence; endowment 3 (資格) quali...
  • : 名詞1. (水流起頭的地方) source (of a river); fountainhead 2. (來源) source; cause 3. (姓氏) a surname
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • 資源 : natural resources; resource
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統、數據庫系統、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告事故,如何協調解決事故,如何避免事故再次發生。總之,本文對信息系統防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的題,尤其是用戶控制的題;接著介紹了幾種浙江大學博士學位論文典型的控制方法,包括強制控制、任意控制、基於角色的控制、基於任務的控制,以及基於公司關系的控制、基於企業聯盟的控制等;在前面描述的典型控制模型基礎上,給出了一個網路化製造系統的綜合控制模型,包括網路化製造系統的用戶和層次關系圖、控制參考模型和控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的控制描述語言。
  3. Condor - g integrates condor ’ s eximious job management functions into globus ’ secure communication among domains protocol and standard remote batch process system access protocol, and help the condor users to use globus resources

    Condor把自身出色的作業管理功能和globus的域間通信協議及遠程批處理系統的標準化協議相結合,就形成了condor - g軟體系統,使得condor系統的用戶也可以很方便的使用globus
  4. These measures include how a user to log in manufacturing application system under web pages, how to control the resource access on the same web page, how to control the divulgence of the anchor link information of the hyperlink and how to control browser bookmark function ' s access to old pages

    ( 3 )提出了基於web頁面方式的製造應用系統用戶界面下,用戶的登錄、對同一個頁面上的進行控制、控制超鏈接錨點鏈接信息的泄漏、控制瀏覽器書簽功能對頁面的等頁面控制措施。
  5. Applications in the same cell, even with global security and java 2 security enabled, can potentially compromise other applications in the same cell by accessing resources of those applications or altering the cell configuration

    在同一個計算單元中的應用程序(即使啟用了性和java 2性)可能會通過其他應用程序的或改變計算單元配置,從而潛在地破壞
  6. The resource manager control bits contain information specific to the resource manager accessing the security descriptor

    管理器控制位包含特定於性說明符的管理器的信息。
  7. Security - critical code is any code that protects sensitive resources and exposes brokered access to the resource to untrusted or partially trusted code by performing the necessary elevation of privilege operations

    性關鍵型代碼為具有以下性質的任何代碼:這些代碼保護著敏感,並通過執行必要的特權提升操作將經過調整的權限公開給不受信任或部分受信任的代碼。
  8. Running your application in full trust makes it easier to access resources on the local computer, but exposes your application and its users to high security risks if you do not design and develop your application strictly according to the secure coding guidelines topic

    以完信任權限運行應用程序將使本地計算機上的變得較為容易,但如果沒有嚴格按照「編碼指南」主題中的要求設計和開發應用程序,則會讓應用程序及其用戶暴露在高風險下。
  9. Jaas provides a flexible, declarative mechanism for authenticating users and verifying their ability to access secure resources

    Jaas提供了一種靈活的、說明性的機制,用於對用戶進行認證並驗證他們的能力。
  10. It gives users secure access to data, it resources, transactions, and processing power that were previously locked up in proprietary systems, so they can better address their clients needs.

    它使用戶可以數據、 it、事務以及先前被限制在私有系統上的處理能力,因此,那些公司可以更好地滿足客戶的需求。 」
  11. Code that does not originate from the local computer and is therefore likely to be less trustworthy receives restricted access to protected resources under the default security policy

    在默認策略下,不是出自本地計算機的代碼(因而可信任度可能較低)會收到對受保護的受限制的權。
  12. Thirdly, the paper analyzes how to carry out cwiss security, such as single - sign on, the rules and implementing in accessing resources and authorizing

    再次,對校園網性實現題,如單點登錄、授權的規則與實施等題進行了詳細的闡述和分析。
  13. Access control is a very important part of the security of operating system. access control is to control the access of objects by the identity of theuser, which is based on the identification and authentication mechanism

    控制是操作系統保護中極為重要的一環,它是在標識與鑒別的基礎上,根據用戶身份對其提出的請求加以控制。
  14. Contemporary, with the basic of ca authentication, digital signature, public - key cryptography and secret - key cryptography, this thesis bring forward a basic model of user registration and c / s, b / s resource accessing under the mechanism that using cryptography to transfer and memory the user ' s password

    同時,在結合pki模式中ca認證、數字簽名以及公開密鑰與對稱密鑰演算法技術的基礎之上,提出了密文傳輸和存儲口令機制下的用戶注冊和c s 、 b s模式的基本模型,以實現c s和b s的機制。
  15. Security trust levels in accessing resources

    >時的信任級別
  16. The success or failure of the resource access attempt is determined purely by operating system - level security

    嘗試成功還是失敗完由操作系統級別的性決定。
  17. To safely manipulate the kernel queue data structures ? that is, in order to ensure thread synchronization ? your code should acquire the appropriate lock ( i. e., resource access control ) first

    為了地操作內核隊列數據結構- -換句話說,為了確保線程同步- -你的代碼應當首先獲取合適的鎖(也就是控制器) 。
  18. This paper analyses the access control research actuality and problems for active node resources, and designs the safety and security architecture of access control for active node resources, and bring forward the access control mechanism for active nodes resource

    文章詳細分析了主動節點的研究現狀和存在的題,設計了主動節點資源訪問安全體系,提出了一種新的主動節點控制機制。
  19. The cisssps adopts three - layer - structure design conforming to j2ee standard, which internally includes platform modules such as search engine, application install management, data management, resources management, safety control etc. and externally provides unified connecting points for information service, unified customer identity attestation, authorization management and access control

    四川公綜合信息查詢系統採用符合j2ee標準的三層架構設計開發,內部包含查詢引擎、應用配置管理、數據管理、管理、控制等平臺化組件;對外提供統一的信息服務接入,統一的用戶身份認證、授權管理和控制。
  20. 19 czajkowski k, foster i, kesselman c. agreement - based resource management. in proc. the ieee, 2005, 93 : 631 - 643

    Gt4核心組件在一個公用框架內解決了與以下方面有關的一些基本題:管理數據傳輸發現等。
分享友人