file system security 中文意思是什麼

file system security 解釋
文件系統安全性
  • file : n 1 紙夾,文件夾。2 釘成冊的文件,檔案,卷宗,案卷,合訂本。3 【計算機】外存貯器,存貯帶。4 行列...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. In july 2005, the exchange fund advisory committee efac endorsed a comprehensive it upgrade programme covering pcs, printers, the file - and - print system, the e - mail and workflow system, it security systems, the swift system a financial industry - owned co - operative messaging and interface software, and banking supervision applications

    於2005年7月,外匯基金諮詢委員會批準一項全面提升資訊科技系統的計劃,計劃涵蓋個人電腦印表機存檔及列印系統電郵及工作流程系統資訊科技保安系統環球銀行金融電信協會swift系統一套由金融業擁有的合作信息及應用軟體,以及銀行業監管應用程式。
  2. Finally, through analyzing the demands of e - government of ezhou. the paper establishes the function module of document flow system. take sending and receiving file administration systems for example, security policies are applied and realized in the system after they are researched

    在對鄂州市電子政務系統進行需求分析的基礎上,確立了公文流轉系統的功能模塊,並在系統開發中對安全策略進行設計與研究,以收文管理模塊和發文管理模塊為例介紹了安全策略的具體應用與實現。
  3. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    本文的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計日誌方法,它可以支持目前常見系統的日誌文件,確保系統被入侵攻擊前的日誌文件記錄不被篡改、刪除,使得入侵者在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各類系統不同日誌文件組成日誌文件庫,為獲取和分析日誌文件的記錄提供支持; 3 )對各類日誌文件的記錄採用關聯分析,更有效的提取潛在的計算機犯罪線索。
  4. A cookie is a text file on your computer that reminds our system of your particular browser preferences and security requirements and lets american express know exactly who you are

    答: cookies是電腦中的文字檔,它能提醒美國運通系統您的瀏覽器的特殊設定及安全性要求,並使美國運通確認您的身份。
  5. Now the csp modules that we can free avail all come from the software csp shipped with the windows system. these software csps are portable in that they can be carried as an executable file, but they inevitably have some limitations : the software csps have the less tamper - resistant and would be inconvenient in the fields of the interactive logon, e - mail signing, e - mail decryption and remote access authentication ; ' they have the lower level degree of security

    但鑒於我們現在可獲得的一系列的csp模塊,均來自windows系統自帶的軟體csp ,軟體csp可以以可執行性文件的形式存在、具有易攜帶性的優點,但是它在防篡改、遠程登陸、用戶的身份認證等領域有其不可克服的缺陷,安全等級比較低。
  6. The paper put forward the structure of file storage design no - default file structure and default file structure particularly which can satisfy demand next generation avionics " demand in allusion to complex data and timely data transmission. real time and security of communication between air system and ground system is key technology

    針對飛機數據復雜多樣、需要保證數據存儲和傳輸有效性的需求,本文提出以文件的方式進行數據的存儲,並詳細設計了滿足新一代飛機數據管理記錄系統要求的非預設文件的結構和預設文件的結構。
  7. When i talk about further distinctions like static and journal file systems, i m emphasizing the consistency and, to some extent, security of file system contents

    當我談到進一步的區分,如靜態和日誌文件系統時,我要強調一致性以及某種程度上的文件系統內容的安全性。
  8. The economy of network expanding of 1000m network, high performance of information flux, security of information transmission is thinked about in the designing. standard of fast ethernet network technology is selected, standard of configuration laying line is used, vpn technology is adopt to realize security of network, it satisfy the need of present and future. designing a manage system information of some group of dalian air force missile, which can manage people, file and training in the real time and dynamic, realize management of science, veracity and speedy

    在設計中考慮了網路經濟性、平滑過度到千兆以太網的擴展性、減少了信息的流量高性能性,信息傳輸的可靠安全性,採用了快速以太網技術作為網路建設標準,採用結構化布線技術進行設備和信息點規劃,利用vpn技術進行安全保護,滿足了部隊現有的需要和擴展的要求初步設計了大連空軍導彈某團訓練信息管理系統,對部隊中的人員、文件及訓練情況進行實時、動態管理,達到了管理的科學性、準確性、迅速性,使軍隊管理成為一個有序的實體。
  9. Web service based distributed file service system, which is based on web, xml, and soap and built on hierarchical cache management, distributed mass - storage data management, access control, has a good extensibility, flexibility, reliability and security on the management system of enterprise ' s mass file date

    基於webservice構架的分散式文件服務系統基於web 、 xml和soap技術、以及層次式緩存管理、分散式海量數據管理、訪問控制等等多項技術,系統實現了企業級海量文件數據管理系統對可擴展、柔性、全分佈、可靠、安全等幾方面需求的支持。
  10. Ntfs performs well in a large - volume environment, and being an advanced file system, it provides not only reliability and security, but also performance

    在大容量環境中, ntfs文件系統執行情況良好,並且作為高級文件系統,它不僅提供可靠性和安全性,而且具有優良的性能。
  11. The restricted security context helps prevent all access to system resources, such as the file system, the network, or the user interface

    受限安全上下文有助於禁止對系統資源的所有訪問,如文件系統、網路或用戶界面。
  12. The restricted security context helps to prevent access to system resources, such as the file system, the network, or the user interface

    方法的代碼在受限安全上下文中執行。受限安全上下文禁止訪問系統資源,如文件系統網路或用戶界面。
  13. Comparing with feathure of embedded filesystem, the paper presents a new file security mechanism. based on the descriptor of the file, file resources are protected in the api level of an operating system. 4

    4 ) 、研究了傳統的審計機制,根據嵌入式系統的資源有限性和運行環境特殊性等特點,提出了一種多層次的安全審計系統。
  14. For example, an administrator might create a security policy to grant code downloaded from the intranet a higher set of permissions such as the ability to access the file system than code downloaded from the internet

    例如,管理員可能會創建一種安全策略,以便向下載自intranet的代碼授予一組較高的權限(如訪問文件系統) ,而向下載自internet的代碼授予一組較低的權限。
  15. The more well - known journaling file systems current on linux, like reiser file system reiser fs and journaling file system, are not available on freebsd, mostly for security reasons

    當前linux上更著名的日誌文件系統在freebsd上是不可用的,這些系統中包括reiser file system ( reiser fs )和journaling file system ( jfs ) ,這主要是出於安全方面的考慮。
  16. A brief talk about the set - up of file sharing and security in computer windows operating system

    淺談計算機視窗操作系統文件共享與安全的設置
  17. Mazieres, d. et al. " separating key management from file system security ". 17th acm symp. on operating systems principles. ( 1999 )

    等著,自檔案系統安全性中區分鑰匙管理,見《第十七屆美國電腦協會論作業系統原則研討會》 , ( 1999 )
  18. The advantage of this architecture is that different security policies can be supported flexibly. as far as a given security policy, the multiplex policy arguments can be configured without recompiling the kernel or modifying the format of the file system

    這種結構使得操作系統能夠靈活地支持不同的安全策略,而且對於一個給定的安全策略,系統能夠配置成支持不同的安全策略配置參數,而不需要重新編譯內核或修改文件系統格式。
  19. The data in the computer stored as files, therefore, file system security is a key in the security of lan

    由於計算機中的數據都是以文件的形式存儲,文件系統安全就成為局域網安全里的一個關鍵部分。
  20. Drdl can be used to describe timing constraints event and supports dynamic change of high level event definition. since its syntax is similar to c language, users can master it easily. by iterating directory event embedded in drdl file system security monitoring and performance monitoring can be integrated into the event monitoring framework

    通用的動態規則描述語言drdl能描述事件的時問約束,支持高層事件定義的動態改變;它採用類似於c語言的語法以便於用戶學習;通過drdl中內置的「遍歷目錄」事件,可以靈活定義規則,將文件系統的安全性檢測與性能監控統一到事件監控框架下。
分享友人