access control mechanism 中文意思是什麼

access control mechanism 解釋
存取控制機構
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • mechanism : n 1 (機械)結構;機械裝置[作用];(故事的)結構。2 【哲學】機械論 (opp vitalism)。 3 【文藝】...
  1. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  2. Provide a mechanism that offers much finer granular access control than simply denying or granting access - that is, a mechanism that can enforce some before and after actions along with " permit " or " deny " permission

    提供一種機制,以比簡單地拒絕訪問或授權訪問更細粒度的控制訪問,也就是說,在「允許」或「拒絕」之前或之後執行某些操作。
  3. An abstract model of secure subnet is put forward based on channel model of vpn and secure subnet model of enterprise in charpter three. and double - way authentication access control mechanism of secure subnet is analyzed in detail in charpte four

    首先以「虛擬專用網路」 ( vpn )隧道模型和企業級安全子網結構模型為基礎,提出安全子網的抽象模型,然後詳細討論了安全子網的雙向認證訪問控制機制。
  4. Extensible access control markup language - or xacml - provides a mechanism to create policies and rules for controlling access to information

    可擴展訪問控制標記語言(或xacml )提供了創建策略和規則來控制信息訪問的機制。
  5. This system makes people fell convenient in looking for data, try my best to our environment protection. the following problems and related solutions are given in this paper : data structure suitable for web computing multi - user access and concurrent control mechanism in webgis network protocol and intelligent information agent of spatial information spatial information security in web computing environment web integration strategy of spatial information based on metadata architecture of webgis at last, the development trend of webgis is discussed

    通過論文工作提出了以下幾個問題並給出了相應的解決方案適合web計算的數據模型webgis中的多用戶訪問與並發控制機制空間信息的網路計算策略與實施方案及關鍵演算法空間信息的網路傳輸協議與智能空間信息代理web計算環境下的空間信息安全性問題基於metadata的空間信息web集成方案與智能空間搜索引擎webgis體系結構最後,論文對webgis發展趨勢進行了探討。
  6. On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter

    在核心服務方面,通過擴展簡單對象訪問協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的訪問控制與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的日誌處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機制,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機制:運行時封裝機制與工廠方法封裝機制,結合這兩種機制並對服務適配器做了實現。
  7. This theis presents more problems that should be resolved by the access control mechanism of the information grid based on the implement of the enterprising information portal

    論文由企業信息網格的實踐進一步提出了信息網格訪問控制需要解決的一些問題。
  8. According to the requirement of electronic documents management in enterprise, an access control mechanism which suit to the traits of electronic documents in enterprise is produced by deeply researching on various access control mechanisms

    對各種訪問控制機制進行了深入的研究,並根據企業電子文檔管理的需要建立了一種適合於企業電子文檔自身特點的訪問控制機制。
  9. In this paper, rbac and grbac are analyzed, and the dimension of tasks is associated with generalized role - based access control mechanism, thus permissions are managed according to the context such as the states of environment and requirements of current task

    本文對rbac和grbac進行了分析,將任務維度與grbac訪問控制機制關聯,從而實現相應于環境狀態和當前任務等上下文信息的動態權限管理。
  10. Secondly, researchs of identity authentication and access control mechanism in secure subnet

    二.安全子網雙向認證訪問控制機制的研究。
  11. The aim of the thesis is to research identity authentication and access control mechanism of secure subnet, and realizeing scheme

    本文的目的是研究安全子網的雙向身份認證和訪問控制機制,及其實現方案。
  12. The inclusion of both field - level and instance - level access control lists satisfies the requirement for a thorough access - control mechanism

    包含有欄位級和實例級訪問控制列表滿足了完全的訪問控制機制的需求。
  13. Secure access control mechanism is key technique that keeps security of subnet, and also the hotspot in the field of network security

    因此,安全的帶雙向認證的訪問控制機制已成為保證子網安全的核心,也是網路安全研究中的熱點。
  14. A resource access control mechanism is needed in such a sophisticated system

    安全性是并行設計實施的關鍵問題。
  15. In this thesis, concurrency control mechanism is studied in depth which is used when multiple users access sharing data simultaneously. access control mechanism is also discussed

    本文深入研究協同設計中的多個用戶同時訪問共享資源時所採用的並發控制機制,並對訪問控制機制進行了探討。
  16. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體化,通過研究發現該模型採用強制性安全策略,不易做到靈活的安全控制,因此添加自主存取控制機制的安全策略對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式數據庫自主與強制性)安全機制。基於實體化規則原理,設計了一個採用ddm安全機制的數據庫控制器? ? dds ( distributeddatabasesecure ,分散式數據庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分散式數據庫安全控制。
  17. This paper analyses the access control research actuality and problems for active node resources, and designs the safety and security architecture of access control for active node resources, and bring forward the access control mechanism for active nodes resource

    文章詳細分析了主動節點資源訪問的研究現狀和存在的問題,設計了主動節點資源訪問安全體系,提出了一種新的主動節點資源訪問控制機制。
  18. The requirements imposed by workflows call for suitable access control mechanism that is more flexible and fine - grained. based on above analysis, a model, rtbac ( role - task based access control for workflow system ), is proposed to solve access control problems of the workflow system

    在上述分析的基礎之上,本文提出了基於角色-任務的工作流系統存取控制模型rtbac ( role - taskbasedaccesscontrolforworkflowsystem ) 。
  19. Under the open internet environment, three security mechanisms, including data confidentiality, identity authentication, and access control mechanism, must be realize when constructing logic secure subnet

    在開放的網際網路絡中,構建邏輯安全子網必須要實現三種安全機制:數據保密性機制、身份認證機制和訪問控制機制。
  20. This paper mainly introduces the application of rbac - based access control mechanism in library so as to provide some reference for digital library construction

    文中主要介紹了基於rbac技術的訪問控制機制在數字圖書館中的應用,擬對現代數字圖書館的建設有所貢獻。
分享友人