拒絕存取 的英文怎麼說

中文拼音 [juécún]
拒絕存取 英文
access denied
  • : 動詞1. (抵抗; 抵擋) resist; repel 2. (拒絕) refuse; reject
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  • 拒絕 : refuse; reject; turn down; decline; in one's refusal to do; give sb. a flat refusal; repel; pass up
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. In both cases, in order to allow or deny access, software analyzes the geometric pattern of minutiae, such as the ridges and valleys that are unique to every finger, and compares it with patterns registered by legitimate users

    以上兩種裝置要決定允許或拒絕存取,都必須利用軟體分析指紋特徵點的幾何圖案,例如每根手指特有的脊紋與溝紋,然後再與合法使用者登錄的指紋模式進行比對。
  3. Thereafter anyone seeking to open the files must place a finger on the sensor ; if the print does not match the recorded data, access is denied

    從此之後,不管有誰試圖開啟檔案,就必須將手指頭放在感測器上;如果指紋不符合先前所記錄的資料,系統就會拒絕存取
  4. The results of this study showed that middle school students " communication problem is significantly correlated with family parenting patterns. for example, compared with parents with the warm and comprehensive pattern to treat their children which shows a significant positive correlation, there is significant negative correlation with communication problems and parents with punishment, firm control, and rejection, denial, and overprotection patterns to deal with their children. but when parents use a predilection pattern to deal with their children, there is no significant correlation with communication problems

    4 、從研究結果可以看出,初中生溝通問題與家庭教養方式的相關情況如下:父母採溫暖、理解的方式教養子女,則父母?子女之間的溝通問題較少,二者在顯著負相關;父母採懲罰、嚴厲、過分干涉、、否認、過度保護等方式對待子女時,父母?子女之間的溝通問題較大,二者之間在顯著正相關;父母採偏愛子女的教養方式與溝通問題無顯著相關。
  5. It is composed of two aspects : first, it uses the java sandbox to control the access of host resource, thus it can prevent the host resource from being accessed by agents without authority ; second, it adopts a authentication based mobile agent transfer protocol to control the transfer of agents in order to refuse the transfer request of invalid agent. thus, it can guarantee that the agent running in the host is valid, in other words, it avoids performing the illegal agent in the host. further more, it can be sure that the agent status data have n ' t been tampered or replaced in the course of transfer

    該方案主要包括兩個方面內容:一、利用java2沙箱控制主機資源的,防止主機資源被移動代理非授權訪問;二、採用一種基於證書的移動代理遷移協議,對移動代理的遷移過程進行控制,不合法移動代理遷移至主機的請求,確保主機上運行的移動代理具有合法身份,並且確保移動代理遷移狀態數據在遷移過程中不被篡改或替換。
分享友人