access control policy 中文意思是什麼

access control policy 解釋
訪問控制策略
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • policy : n 1 政策,政綱;方針,方向;方法。2 策略;權謀;智慧;精明的行為。3 【軍事】政治,行政。4 〈蘇格...
  1. An access control policy suitable for mis

    一種適用於管理信息系統的訪問控制策略
  2. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  3. The security policy is used for access control checks, which are performed by the jvm at runtime

    (按照應用程序的需要) 。安全策略用於訪問控制檢查,這是由jvm在運行時執行的。
  4. The system makes a network security access mechanism suitable for user ' s security policy, including three parts : package filtering router : offering security access control in network layer ; proxy server : used for security access on application layer ; authentication server : used for authentication of user ' s identity

    根據該模型,本文設計了一個防火墻原型系統,該系統提供了一個適合用戶安全策略的網路安全訪問機制,它由以下三個部分組成:包過濾路由器,用來提供網路層一級的安全訪問機制;代理服務器,用來提供應用層一級的訪問控制機制;認證服務器,用來提供用戶身份認證。
  5. They cover various issues including ethics and data privacy policy, data classification policy, access control policy, technical measures for protection of customer personal data, location security, staff security and transfer of customer personal data

    守則內容涵蓋多個層面,包括操守及資料私隱政策、資料分類政策、取存資料管制政策、保障顧客個人資料的技術措施、儲存資料地點的保安、員工的保安及顧客個人資料轉移的保安。
  6. It provides fine grained access control, using a local name space hierarchy, and a simple, flexible, trust policy model ; these features allow for the ability to create groups and delegate authorizations. finally, it is proposed that an spki certificate based payment system that offered a

    Spki / sdsi為使用者提供了細粒度的訪問控制手段,它使用局部名字空間和一個簡單、靈活的信任策略模式,這些特性使得可以創建組結構和進行授權代理。
  7. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  8. We point out a new better resolution, adaptive p - persistent csma / cd media access policy, for ethernet after introducing its default in the second chapter. the commercialized local area networks media access control protocol ieee 802. 3 is 1 - persistant csma / cd, which leads distinctly poor performance under heavy loads in the same collision domain

    針對ieee802 . 3局域網介質隨機訪問協議1 -持續csma / cd ,在同一個沖突域內,它的性能在重荷載下有明顯缺陷的問題,分析了p -持續csma / cd協議,提出了一種新的關于概率p的自適應演算法。
  9. Delegation enhances the flexibility of authorization in access control and can be seen as a implement of dac security policy in some degrees

    委託增加了訪問控制中授權的靈活性,可看作在一定程度上實現了自主訪問控制( dac )安全策略。
  10. The model is also applicable for xml schema documents. a flexible and practical method to enforce discretionary access control ( dac ) policy on xml documents is presented in this paper

    2 )提出了一種靈活實用的方法對xml文檔實施自主訪問控制策略,該方法基於功能強大的xml模式而不是傳統的dtd技術。
  11. This thesis proposes a role - based access control policy frame

    文章提出了基於角色的訪問控制策略框架。
  12. How to enforce mandatory access control ( mac ) policy on xml documents is first proposed

    3 )首次討論了在xml文檔中實施強制訪問控制策略的方法。
  13. This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic

    並提出利用權能對資源訪問控制策略進行描述,動態維護。
  14. However, developers will still push the real estate investment 20 percent plus higher although the policy of cooling down the redhot sector will remain valid such as strict control on demolition, difficult access to credit, and more implementation of land control policy. this, plus the effect of the interest rate hike last october, is expected to work

    石家莊到太原線路由石家莊運輸總公司河北省高客公司石家莊裕通有限公司聯合運營,是近年來石家莊高速客運市場首次批量換車,作為石家莊運輸市場的形象工程,市委市政府對此線路的改造非常重視,對投入運營的車輛要求相當嚴格。
  15. Base on lsm framework, many different access control models have been implemented as loadable kernel modules. this paper has researched the mechanism of the lsm, and implemented a kind of security auditing policy

    本文對lsm的設計和安全策略的實現進行深入的研究,並運用lsm的可移植性提出了一種基於lsm的通用安全審計系統。
  16. In the 4th chapter, we discuss the problems in the implement of the web service based distributed file service system. it focuses on four problems : the design of central control unit, the policy of mass storage in local file service unit, the parallel access control algorithm and hierarchical cache management mechanism

    論文的第四部分介紹了基於webservice的分散式文件服務系統在應用實現中需要考慮的許多方面的問題,構造出針對四個方面問題的演算法模型:集中控制單元設計模型、海量文件的本地存儲策略、文件並發訪問控制演算法和分層的緩存管理機制。
  17. The biggest difference between the jdk 1. x model and the new security architecture of the java 2 platform sdk version 1. 2 was the introduction of a new configurable security policy, which allowed for finegrained and administrable access control

    Jdk 1 . x模型和java 2平臺sdk版本1 . 2的新安全結構之間的最大區別是引入了新的、可配置的安全策略,這樣就可以實現細化的和可管理的訪問控制。
  18. After decoding the user role encapsuled in active packet, we can obtain the method describing policy of access control in policy store, called capability

    在主動信包中封裝用戶角色信息,主動節點解析出用戶角色后,依據它在策略庫中匹配相應的描述控制訪問權限策略的方法,即權能。
  19. Is there written corporate access control policy governing access to computing resources

    有否制定有關管制使用公司電腦資源的政策?
  20. The firewall enforces the access control policy, i. e. permit or deny, between two networks

    防火墻執行接達控制政策,即負責準許或拒絕兩個網路之間接達的工作。
分享友人