access control information 中文意思是什麼

access control information 解釋
訪問控制信息
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  4. Xml security : control information access with xacml

    Xml安全:使用xacml控制信息訪問
  5. Control information access with xacml

    使用xacml控制信息訪問
  6. Extensible access control markup language - or xacml - provides a mechanism to create policies and rules for controlling access to information

    可擴展訪問控制標記語言(或xacml )提供了創建策略和規則來控制信息訪問的機制。
  7. You can add access control list information to the

    方法可將訪問控制列表( acl )信息添加到
  8. There are three parts in material implementation : access control information, access control enforcement facility and access control decision facility

    具體實現主要分為三部分:訪問控制信息、訪問控制執行模塊和訪問控制決策模塊。
  9. The dissertation is dedicated to role - based access control ( rbac ) technology and its application in court case management information system

    本論文研究基於角色的訪問控制技術及其在法院系統中的應用。
  10. Skynet personal firewall edition is the use of the personal computer network security procedures, according to managers to set rules to guard the security network, provide powerful access control, information filtering and other functions, help you ward off network intrusions and attacks, prevent information leakage

    天網防火墻個人版是個人電腦使用的網路安全程序,根據管理者設定的安全規則把守網路,提供強大的訪問控制、信息過濾等功能,幫你抵擋網路入侵和攻擊,防止信息泄露。
  11. Gets or sets the file or directory in which access control information can be viewed

    獲取或設置可在其中查看訪問控制信息的文件或目錄。
  12. Gets or sets the file or directory in which access control information can be changed

    獲取或設置可在其中更改訪問控制信息的文件或目錄。
  13. The absolute path of the file or directory in which access control information can be viewed

    可在其中查看訪問控制信息的文件或目錄的絕對路徑。
  14. You can then populate the object with access control information and apply it to a file

    然後可以使用訪問控制信息填充該對象,並將其應用於文件。
  15. The absolute path of the file or directory in which access control information can be changed

    可在其中更改訪問控制信息的文件或目錄的絕對路徑。
  16. You can then inspect, add, or delete the access control information for the specified file

    然後您可以檢查、添加或刪除該指定文件的訪問控制信息。
  17. You can then populate the object with access control information and apply it to a directory

    然後,您可以使用訪問控制信息填充該對象,並將其應用於目錄。
  18. This constructor retrieves the access control information for the specified file and then creates a

    此構造函數檢索指定文件的訪問控制信息,然後創建一個封裝該信息的
  19. In order to improve system performance, a general cache to preserve access control information is built upon split trees inside the secure kernel

    為提高系統性能,可以在安全內核中創建一個以分裂樹為基礎的訪問控制信息通用緩存。
  20. Mac, nist - rbac access control model ; 2. analyzes the access control needs of the applied electronic government system ; 3. uses the language of uml to proceed the detailed design to the system of rbac ; 4, uses the language of xml to describe access control information to the model of rbac and illustrates alternant techniques of xml realization in the distributed type of network environment ; 5

    在訪問控制設計部分,本文做了如下工作: 1 、對dac 、 mac 、 nist - rbac訪問控制模型進行了分析比較; 2 、分析了電子政務應用系統的訪問控制需求; 3 、用uml語言對rbac系統進行了較為詳細的設計; 4 、用xml語言對rbac模型的訪問控制信息進行了描述,並闡述了分散式網路環境下xml交互的實現技術。
分享友人