授權信息 的英文怎麼說

中文拼音 [shòuquánxìn]
授權信息 英文
authorization message
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • 授權 : empower; authorize; warrant
  1. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當網路配置后,用戶就可以在任一internet終端實現對監控主機的訪問和控制,以進行調度優化,遠程診斷與維護。目前,這套工業遠程監控系統已在省計算機重點實驗室進行了運行測試,系統工作正常,達到了預期要求。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非訪問、泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. With the rapid development of the internet and electronic commerce, it is required that service division should be more and more specialized and fine - sorted. as a result, public - key infrastructure ( pki ), which has both the function for the authentication and the function for the authorization, has become maladjusted in the present information technology society

    隨著internet和全球電子商務的突飛猛進,對服務分工要求越來越細的同時,現有公鑰基礎設施pki框架中同時實現身份認證和管理的功能模式,已越來越不適應當代社會的發展需求。
  4. Countermeasures for the serious problems of the financial control over subsidiary companies are to ( 1 ) establish a scientific share holding structure of its subsidiary companies ; ( 2 ) strengthen its control over authorization right of its subsidiary companies ; ( 3 ) establish a scientific budget duty system ; ( 4 ) establish a scientific financial reporting system ; ( 5 ) use modern technology of information and network to establish the financial balance network of business operation, accounting checking network and electronic bank system ; ( 6 ) perfect the target assessing system over its subsidiary companies ; ( 7 ) send financial supervisors to its subsidiary companies ; ( 8 ) strengthen the scheduled or nonscheduled financial audit over its subsidiary companies

    摘要子公司的財務控制問題日顯突出,解決的對策是:建立科學的子公司股控制結構;加強對子公司進行控制;建立科學的責任預算制度;制定科學的財務報告制度;利用現代化的網路系統,建立經營業務結算網、會計核算網和網上銀行結算系統;完善對子公司的考核指標體系;向子公司委派財務總監來實現日常的財務監控;加強定期或不定期審計,實現對子公司的財務監督。
  5. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理和推薦式的安全訪問機制,用以提高系統的訪問安全性,並大大減少管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  6. The reproduction or use of this work in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, and including republication as or in connection with instructional or training seminars, and in any storage and retrieval system, is forbidden to anyone except an authorized wal - mart associate doing so for the sole purpose of training wal - mart associates on the material contained within

    除非出於培訓目的而獲特別,否則任何人,不論出於任何目的,都不能將此文件的任何部分以任何形式通過任何方式,如電子或機械印刷等,進行復制或傳播,包括影印、抄錄,或使用其他儲存與回收系統。
  7. We also discussed some of the finer details of privileges, including implicit privileges, the differences in authorization between static and dynamic sql, and how privilege information is stored in the system catalog tables

    還討論了特的某些細節,包括隱式特、靜態和動態sql之間方式的差異以及特如何存儲在系統編目表中。
  8. There are two ways to provide the authorization information

    有兩種方式可以用來提供授權信息
  9. Access authorization information like user names and passwords

    訪問授權信息(比如用戶名和密碼) 。
  10. Storing the entities authorization information on trusted servers

    在可服務器上存儲實體的授權信息
  11. Object by providing the xkms key data and authorization information

    通過提供xkms密鑰數據和授權信息,創建
  12. Db2 udb stores and maintains user and group authorization information internally

    Db2 udb在內部存儲和維護用戶/組的授權信息
  13. To use the same database and user information as the

    使用相同的數據庫和用戶,以便使用一個數據庫即可獲得身份驗證和授權信息
  14. Is a protocol to transport authentication and authorization information in an xml message

    是以xml消傳輸認證和授權信息的協議。
  15. In addition, it displays the current state of the applications, license information, etc

    另外它還顯示應用程序的當前狀態,授權信息
  16. Meanwhile, cache mechanism is brought forward to improve the query efficiency on the authentication information

    同時,為了提高授權信息的檢索效率,本文採用了緩存機制。
  17. The saml standard provides interfaces that allow third parties to send their requests for authentication and authorization

    Saml標準提供了允許第三方實體請求驗證和授權信息的介面。
  18. Authorization is the process of determining access and privilege information about specific database objects and actions for a supplied user id

    是決定指定用戶id對特定數據庫對象和動作的訪問和特的過程。
  19. The new authorization model in plam can be integrated into the communication layer rpc sockets to securely transmit authorization information to the target resource manager

    Plam中的新模型可以集成到通層( rpc / socket )中,從而將授權信息安全地傳輸給目標資源管理器。
  20. But the basic problem of dce s redundant flow of authorization information on the wire remains : duplicate copies of the same user s pacs are being sent to resource managers on multiple logins by the user

    然而, dce冗餘授權信息這一基本的問題在線路中依然存在:同一用戶的多次登錄會導致向資源管理程序發送多份該用戶的pac
分享友人