resource access 中文意思是什麼

resource access 解釋
資源存取, 資源訪問
  • resource : n. 1. 〈pl. 〉資源;物力,財力。2. 方法,手段;機智,智謀,才略。3. 消遣,娛樂。adj. -ful ,-fully adv.
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. To disallow access to the resource using that name

    禁止訪問使用該名稱的資源。
  2. Hod 3270 resource adapter for access to host systems with 3270 screens

    用於訪問帶3270屏幕的主機系統的hod 3270資源適配器
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. Always give a predetermined user name the minimal access privileges to a resource

    始終將資源的最少訪問特權給予預設用戶名。
  5. The globus toolkit has been developed since the late 1990s to support the development of service - oriented distributed computing applications and infrastructures. core gt components address, within a common framework, fundamental issues relating to security, resource access, resource management, data movement, resource discovery, and so forth. these components enable a broader " globus ecosystem " of tools and components that build on, or interoperate with, gt functionality to provide a wide range of useful application - level functions

    Gt globus toolkit是面向服務的分散式計算應用和基礎設施的開發工具,它以上世紀九十年代以來的許多分散式系統和技術為基礎,其中較有影響的是過去十幾年的metacomputing , legion和i - way等創新項目,以及當前的web service ,虛擬機和peer - to - peer架構等技術。
  6. These measures include how a user to log in manufacturing application system under web pages, how to control the resource access on the same web page, how to control the divulgence of the anchor link information of the hyperlink and how to control browser bookmark function ' s access to old pages

    ( 3 )提出了基於web頁面方式的製造應用系統用戶界面下,用戶的安全登錄、對同一個頁面上的資源訪問進行控制、控制超鏈接錨點鏈接信息的泄漏、控制瀏覽器書簽功能對頁面的訪問等頁面資源訪問控制安全措施。
  7. This is because resources have jndi names that can be looked up by any application, and there is no authorization on resource access

    這是因為資源具有jdni名稱,而此名稱可以由任何應用程序進行查詢,並且資源訪問上沒有授權機制。
  8. Next, proposing the grid resource access scheme. the goal is considering the resource provider ’ s and consumer ’ s behalf, and they can gain most interests, so that it can offer the motivation to attract them attending the grid. finally, proposing the optimization of grid cache management policy, and this paper gives the caculating method of the resource value, then gives the optimal admission policy of grid cache. because in the research of grid resource management, it is unnecessary to use real systems to evaluate the performance and accuracy of the algorithms, usually emulators are used to handle with it. several grid emulators are illustrated in this paper, and gridsim, a grid modeling and emulation toolkit, is introduced in details. finally, with the help of gridsim toolkit, the emulation of grid resource management algorithms with qos requirements is realized

    其目標是考慮到資源提供者和使用者兩方面的價值利益,使雙方都達到盡量大的收益,從而使資源提供者有足夠的動機繼續提供其資源共享,同時使使用者以盡量少的花費獲得較優的服務; ( 5 )提出了基於經濟模型的網格cache管理優化,給出了網格cache判斷預測資源價值的計算公式,進而對網格cache策略進行了基於經濟的優化,主要是其接受策略的經濟優化。
  9. Semaphores and reader - writer locks are designed to control this kind of pooled resource access

    信號量和讀寫器鎖旨在控制此類池資源訪問。
  10. This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic

    並提出利用權能對資源訪問控制策略進行描述,動態維護。
  11. This helps a company build their application, and it doesn t matter where it gets deployed or whether it s using lightweight directory access protocol ldap, tivoli access manager, resource access control facility racf, or any authorization entity, it still fits into an environment

    這可以幫助公司構建自己的應用程序,對哪些地方進行部署,以及是使用ldap (輕量級目錄服務協議) 、 tivoli access manager 、 racf ( resource access control facility ) ,還是使用其他身份驗證實體,這些都無關緊要,公司仍然可以適應某種部署環境。
  12. Analysis on cross domain digital resource access

    信息時代圖書館特徵分析
  13. Granting network resource access rights to the logon account

    授予登錄帳戶訪問網路資源的權限
  14. Specifies the network resource access that is granted to code

    指定授予代碼的網路資源訪問權限。
  15. A resource access control mechanism is needed in such a sophisticated system

    安全性是并行設計實施的關鍵問題。
  16. It consists of four components : projmng, kernelsetting, infomgr and resource access controller

    本文的第五部分:對全文作了一個總結。
  17. Blocks or finalizers being executed, so it is important to abstract all operating system resource access through the

    塊或終結器的執行,因此,通過
  18. Rcbac model introduces the context information and the group mechanism to the access control policies. in rcbac, the context information is used to control the user assignment and permission assignment dynamically and the group mechanism is used to simplify authorization further. thus, rcbac can implement the fine - grained access control and satisfy the enterprise ’ s demand for the unified resource access control

    在對rbac的一些改進模型分析研究的基礎之上提出了基於角色和上下文的訪問控制模型( roleandcontext - basedaccesscontrol , rcbac ) , rcbac模型將上下文信息和組化機制引入到訪問控制策略中,利用上下文信息動態地控制用戶分配和權限分配,利用組化機制進一步簡化授權,實現了細粒度的訪問控制,滿足了企業統一資源訪問控制的需求。
  19. The success or failure of the resource access attempt is determined purely by operating system - level security

    資源訪問嘗試成功還是失敗完全由操作系統級別的安全性決定。
  20. To safely manipulate the kernel queue data structures ? that is, in order to ensure thread synchronization ? your code should acquire the appropriate lock ( i. e., resource access control ) first

    為了安全地操作內核隊列數據結構- -換句話說,為了確保線程同步- -你的代碼應當首先獲取合適的鎖(也就是資源訪問控制器) 。
分享友人