resource access security 中文意思是什麼

resource access security 解釋
淘汰訪問安全
  • resource : n. 1. 〈pl. 〉資源;物力,財力。2. 方法,手段;機智,智謀,才略。3. 消遣,娛樂。adj. -ful ,-fully adv.
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The globus toolkit has been developed since the late 1990s to support the development of service - oriented distributed computing applications and infrastructures. core gt components address, within a common framework, fundamental issues relating to security, resource access, resource management, data movement, resource discovery, and so forth. these components enable a broader " globus ecosystem " of tools and components that build on, or interoperate with, gt functionality to provide a wide range of useful application - level functions

    Gt globus toolkit是面向服務的分散式計算應用和基礎設施的開發工具,它以上世紀九十年代以來的許多分散式系統和技術為基礎,其中較有影響的是過去十幾年的metacomputing , legion和i - way等創新項目,以及當前的web service ,虛擬機和peer - to - peer架構等技術。
  3. Security - critical code is any code that protects sensitive resources and exposes brokered access to the resource to untrusted or partially trusted code by performing the necessary elevation of privilege operations

    安全性關鍵型代碼為具有以下性質的任何代碼:這些代碼保護著敏感資源,並通過執行必要的特權提升操作將經過調整的資源訪問權限公開給不受信任或部分受信任的代碼。
  4. The drawback of the password is that it is easily given away. therefore there are great security threats in the access to information and resource in computer, hi an effort to confront the threats biometrics ( such as fingerprints, keystroke dynamics, and so on ) combined with the traditional verification methods may greatly increase the system security

    傳統的計算機系統登錄方式為單一的口令認證,其弊端是口令易被泄露,帶來安全隱患,而採用人的生物特徵(如指紋和擊鍵模式等)結合傳統認證方式可增強系統的安全性。
  5. Besides, it uses multi - thread technology to realize parallel signals data acquisition, uses ado ( activex data objects ) technology to access the resource of database, uses com ( component object model ) to develop data - acquisition components, data - process components, and so on, uses sql server 2000 to design database, since sql server 2000 has powerful management functions, and provides plentiful management tools to support integrity, security and operation management of task

    此外,採用多線程技術實現了對各類信號的并行實時數據採集;採用了ado ( activexdataobjects , activex數據對象)技術對數據庫資源進行訪問。採用com ( componentobjectmodel ,組件對象模型)開發了數據錄取、數據處理等組件。數據庫採用sqlserver2000 ,它具有強大的數據管理功能,提供了豐富的管理工具,支持數據的完整性管理、安全性管理和作業管理。
  6. The success or failure of the resource access attempt is determined purely by operating system - level security

    資源訪問嘗試成功還是失敗完全由操作系統級別的安全性決定。
  7. Grants the asp. net application permissions to access any resource that is subject to operating system security

    授予asp . net應用程序訪問任何資源的權限(受操作系統安全性的限制) 。
  8. This paper analyses the access control research actuality and problems for active node resources, and designs the safety and security architecture of access control for active node resources, and bring forward the access control mechanism for active nodes resource

    文章詳細分析了主動節點資源訪問的研究現狀和存在的問題,設計了主動節點資源訪問安全體系,提出了一種新的主動節點資源訪問控制機制。
  9. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
分享友人