數據訪問控制 的英文怎麼說

中文拼音 [shǔfǎngwènkòngzhì]
數據訪問控制 英文
data access control
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 數據 : data; record; information
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型庫中某種特殊屬性對象來存儲,以庫方式對企業電子文檔進行集成的、統一的管理,提出一種的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全,用以提高系統的安全性,並大大減少授權管理維護量;研究了特殊屬性對象的庫存儲機理,從而構造一種快速存儲、和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的
  2. This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable

    當前的web技術正處于發展階段,針對這種情況,本文通過分析當前各種流行的web方案的優缺點,結合在三層次的c / s系統中扮演越來越重要的角色的中間件技術,採用了microsoft公司所提出的一致技術,利用ado項,結合當前的asp語言,底層庫採用了sqlserver7 . 0的存儲過程技術,設計了一種自己的web方案,即在browser / server系統當中,客戶端通過顯示在瀏覽器中的各種activex項,通過了ado連接庫,的處理利用了存儲在庫內部執行,實現對後端庫的高效,並且這種方案在給系統帶來較高的實時響應性能的同時,減少了網路流量,降低了web服務器成為系統瓶頸的可能性,也增強了系統的可移植性。
  3. 6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data

    6 )採用嚴格的方式與權限管理機。 fsca系統充分保證了用戶的合法性與有效性。
  4. Unlike file systems, db2 content manager uses a powerful relational database to provide indexed search, security, and granular access control at the individual content item level

    與文件系統不同, db2 content manager使用強大的關系庫在單獨內容條目的層次上提供索引檢索、安全性和小粒度的
  5. First, thinking about all kinds of security. research internet security and financial affairs control. through the analyze of the internet financial affairs information system ' s risk, talk about the inter - control on the base of internet financial affairs information system ( operating system control, database control ) and outer - control on the base of internet financial affairs system ( surrounding control, visiting controk e - commerce controk remove disposal control ) second, on the e - currency and financial affairs balance, design different kinds of e - currency balance programmes. ( credit card. saving. case ) simplify the enterprise ' s balance and saving the last of balance ) widen the range of e - commerce activity

    首先,出於各個方面的安全考慮,就網路安全與財務方面作了研究。通過對網際網路財務會計信息系統的風險分析,提出了基於網際網路財務信息系統的內部(操作系統)和基於網際網路財務信息系統的外部(周界、大眾、電子商務、遠程處理)的方法。其次,就電子貨幣與財務結算方面,設計了不同類型電子貨幣的結算程序(信用卡型電子貨幣結算程序、存款利用型電子貨幣結算程序、現金模擬型電子貨幣結算程序)使企業簡化結算手續和節省結算費用的開支,擴展了電子商務活動的范圍。
  6. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    鏈路層的設計中針對水下聲通道的特點,對于介質協議採用了maca協議,它使用rts - cts報文握手機來解決uan中的隱蔽終端、暴露終端以及功率題。
  7. In this thesis, after analyzing the existed access control technology, we bring forward a rbac security access control and manage model based on ldap and design the security access control for the component datatrans

    論文在分析了現有的模型的基礎上,提出了基於ldap的rbac安全和安全管理的模型,並對分散式傳輸組件datatrans進行安全性的擴充設計。
  8. This dissertation mainly introduces the key technology and innovative research of ws - dfs, such as web - based architecture, flexible component model, distributed local file storage unit, parallel access control and high efficiently organize and index for huge amount data

    本文主要論述基於web服務的分散式文件服務系統的關鍵技術及創新研究,包括體系結構、靈活的組件模型、全分佈的本地文件存儲單元、並發和海量高效的組織和檢索等六個方面的研究成果。
  9. Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on

    基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密碼、條目的添加、刪除、修改、設置組、設置角色和設置等,前臺頁面使用了樹型結構,直觀的反映了目錄服務器中的拓撲結構。
  10. 2. a comprehensive framework is developed for the above model. those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on

    完整設計了模型的整個可實現框架:包括各組成模塊的功能、相關結構和消息編碼格式、證書管理庫和密鑰環的設計,以及具體的流程等。
  11. Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic

    以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:鏈路層和物理層,並將其細分為一些功能子層,包括鏈路層的llc (邏輯鏈路)子層和mac (介質)子層,物理層的pcs (物理編碼子層) 、 pma (物理介質附加子層)和pmd廈門大學碩士學位論文摘要(物理介質相關于層) 。
  12. Because the existing data model can ’ t work perfectly with given application, this paper brings forward domain data model ( ddm ). ddm ’ s structure is more fit for given applied field. it helps us to design and develop mis easily and it can solve the problem of data access control on applied layer

    本文針對現有的模型與具體的應用結合不緊密的特點,提出了構造更貼近具體應用領域的域模型,用於幫助mis的設計和開發,解決mis開發過程中,應用層面的數據訪問控制的難題。
  13. During designing and implementing system, the following problems are also solved, controlling sharing access, creating performance log file, maintaining performance information

    另外,在系統的設計、實現過程中還解決了性能的維護方式和共享,以及性能日誌文件的生成、性能分析的輔助處理等多項題。
  14. A collection of racf users who can share access authorities for data sets

    資源設施( racf )用戶的集合,他們能共享集的權。
  15. Is an effort to define an access control framework for xml data

    是一種為xml定義框架的措施。
  16. Analyze the systematic structure of the product data management system and study the object representation of the product data integration model, the product data attribute and operation, the product information modeling and the theory and method of access control modeling in order to set up the object model of the product data access control and describe the data base conversion of the object model and executive method

    分析產品管理系統的體系結構,研究產品的集成模型的對象表示,產品屬性和操作,產品信息建模和建模的理論和方法;建立產品數據訪問控制的對象模型,並說明對象模型的庫轉換和實現方法。
  17. Data service layer, including data access service layer, data access control layer and data access security mechanism, works to ensure the security and control of the access of service handling to the data in enterprise information platform

    服務層包括服務層、數據訪問控制層和安全機,由服務層來保證業務處理對企業信息平臺的安全和
  18. Then we propose an xml data access control system which uses extended xpath and user or user group information to define the access object. we describe the architecture, the subject, object, access rules and the different levels of the rules. and we also illustrate the access control process with an example

    在基於xml的數據訪問控制方面,本文提出了一個利用用戶、用戶組和擴展后的xpath進行對象描述的xml數據訪問控制方案,對該方案的架構,的主體、對象、授權規則和規則級別等進行了詳細的介紹,並給出了應用示例。
  19. The thesis use role based access control model, design a set of logical data model and propose the basic algorithm for access database

    數據訪問控制方面採用了基於角色的安全策略,設計了數據訪問控制的邏輯模型和基本方法。
  20. General compressing technologies are not proper in some circumstances for the receivers are always required to decompress the data completely to manupulate the original data ( querying, validating etc. ). the embedded document structure of xml also makes it difficult to perform access control because the traditional file level access control systems could not fulfill the requirement of element or attribute level access control. in the paper we first present a scheme for xml - based data exchange which is an xpath - query - friendly compressor for xml

    壓縮技術是提高交換效率的一種方法,但接收方需要對壓縮文檔完全解壓才能夠執行進一步的操作,在很多應用中這種方式並不適用,這就提出了如何在高效壓縮的同時在壓縮后的xml文檔上進行查詢等操作的題;另一方面,由於xml文檔的層次結構的特殊性,傳統的文件級別的已經不能適應在元素、屬性的級別上進行的需要,所以對只需要部分xml文檔內容的用戶進行有效的數據訪問控制也是xml數據訪問控制面臨的一個題。
分享友人