access control database management 中文意思是什麼

access control database management 解釋
訪問控制數據庫管理
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • management : n. 1. 辦理,處理;管理,經營;經營力,經營手腕。2. 安排;妥善對待。3. 〈the management〉〈集合詞〉(工商企業)管理部門;董事會;廠方,資方。
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  3. 2. a comprehensive framework is developed for the above model. those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on

    完整設計了模型的整個可實現框架:包括各組成模塊的功能、相關數據結構和消息編碼格式、證書管理庫和密鑰環的設計,以及具體的訪問控制流程等。
  4. It analyzes the key factors of human resource modeling, the ways to select resource, the primary strategy base of allocating resources dynamically and the access control model of operating system and database system. because cmm ( capability maturity model ) and rup ( rational unified process ) are too complex to use properly in the small organization, a human resource management model of middle / small software developing organization is proposed. it is based on the cmm and rup model and combined with our working experience

    本文分析了資源管理的要素、分配策略、確定了資源選擇方法和權限管理方式,對人力資源進行建模管理,並參考cmm ( capabilitymaturitymodel )和rup ( rationalunifiedprocess )的資源管理,歸並相關角色,結合作者的工作經驗,提出了一個中小型企業軟體開發人力資源模型,與資源管理模塊配合使用。
  5. This thesis presents the realization of the web system on the thought of 3 - tier architecture : data, middle and presentation tiers. it concludes the database design, the way of programming object oriented components, the access of database, the web form design based on asp. net and the authorization control. at last, it gives the requirement of running this system and the way of security management

    在系統實現上,根據web三層設計的思想,從數據層、中間層和表現層來設計系統,其內容包括數據庫的設計,面向對象的組件編程, web數據庫訪問技術的研究,基於asp . net的web表單的設計,權限控制設計等,並對系統安全管理的問題進行了探討和研究。
  6. In the essay, discussions are focused on the transparency of database linkage and location, error management in remote control, treatment of suspending matters, referential integrity constraint, database access security and inquiry optimization

    文中,對oracle分散式數據庫系統設計與實現中的數據庫鏈接與位置透明性、遠程過程中錯誤的管理、懸而未決事務的處理、參照完整性約束、數據庫訪問的安全性以及查詢優化幾個部分重點進行了探索。
  7. The main works of the paper is designs the management information system of intelligent community based on lonworks technology, implements the automation of transmitting the value of water meter, ammeter and gas meter and the security system. using access designs the database ; using visual basic implements the function of searching, reporting, calling up of capital ; using neuron c and dde implements the communication with the dde server. finally, based on the example of air - condition, discusses the application of fuzzy control technology to the intelligent community and uses matlab realizing computer simulating

    本文的主要工作是使用lonworks技術開發了智能小區管理系統,實現了智能住宅小區的水、電、煤氣表的遠程抄取,計費系統及安防報警的自動化。使用access設計數據庫;使用visualbasic完成語音催繳、各種查詢、列印操作的設計;使用neuronc語言和動態連接庫技術完成與lonworks開發工具中的ddeserver服務器的通信,有效的將智能控制器的各種數據信息讀取和存儲在數據庫中。最後以空調恆溫控制為例,對模糊控制在智能化方面作了一些探討,並用matlab作了模擬。
  8. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體化,通過研究發現該模型採用強制性安全策略,不易做到靈活的安全控制,因此添加自主存取控制機制的安全策略對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式數據庫自主與強制性)安全機制。基於實體化規則原理,設計了一個採用ddm安全機制的數據庫控制器? ? dds ( distributeddatabasesecure ,分散式數據庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分散式數據庫安全控制。
  9. 4. the paper analyzes role - based access control ( rbac ) technologies and puts forward role - based control secure database management system model

    分析了基於角色的存取控制技術。提出了基於角色控制安全數據庫管理系統模型。
分享友人