authorization table 中文意思是什麼

authorization table 解釋
權限表
  • authorization : n. 1. 授權,委任。2. 認可,核準。
  • table : n 1 桌子;飯桌,餐臺。2 手術臺;工作臺;游戲臺;賭臺;寫字臺。3 (飯桌上的)食物,酒菜,伙食;一...
  1. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。
  2. By the role number of role authorization table, certification server can use different security - class identification technologies according to diverse users dynamically, and decides responding authorization with the identification results

    通過角色授權表中的角色數字,認證服務器能夠對不同用戶動態地採用不同安全級別的認證技術,並能根據認證結果做出授權判斷。
  3. Software system comprises some main subsystems such as the tss embedded os, host interface specification, file access control module, explicit authorization table management and audit system

    軟體系統包括tss的嵌入式操作系統、介面協議、文件訪問控制模塊、顯式授權程序、靜態授權表的管理,以及審計系統等重要的子系統。
  4. On the basis of the above resolution, the paper constructs user - role mapping table and role authorization table

    根據以上內容,本文建立了用戶?角色映射表和角色授權表。
  5. Mapping table of user and role is established through their relevance, and authorizing table of role and table is obtained in terms of map relevance among role, database, database table. by the role ' s flag number, certification server dynamically applies different secure identification technique to give identification to users, and gives authorization decision according to result of identification. the method realizes authorization through program, and is not dependent on concrete database

    根據用戶與角色的映射關聯來獲得用戶和角色的映射表,根據角色、數據庫和數據庫表映射關聯來獲得角色和數據庫表的授權表,通過角色的標識數字,認證服務器動態採用不同安全級別的認證技術對用戶進行認證,並能根據認證結果作出授權判斷,這種方法使用應用程序來實現授權而不需依賴于具體數據庫。
分享友人