物理訪問控制 的英文怎麼說

中文拼音 [fǎngwènkòngzhì]
物理訪問控制 英文
physical access control
  • : 名詞1 (東西) thing; matter; object 2 (指自己以外的人或與己相對的環境) other people; the outsi...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 物理 : 1. (事物的內在規律) innate laws of things2. (物理學) physics
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管員的權力和責任,包括安全、系統配置、帳戶設置及使用權限、口令管、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管和應用方面提供了基本的框架。
  2. Consequently, the author presents the basic principle of ofdm, and the process how to utilize the certain technology based on fft & ifft to realize the ofdm system

    描述了802 . 11協議介質層和層的操作及幀結構。接著,作者論述了ofdm的基本原,以及如何用基於fft和ifft的技術實現ofdm系統。
  3. Secondly, based on the function requirement of usb device controller the system was divided into five modules, clock extracting, event detect, physical layer interface, media access controller, endpoint control layer and every module was designed in detail

    其次,針對usb設備器的功能要求,將系統分為時鐘提取、事件檢測、層、介質層、端點層五個模塊並對每個模塊進行了詳細設計。
  4. Memory management unit, translates virtual to physical addresses and provides access permission control

    內存管單位,把虛地址轉化為地址並且提供許可
  5. Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic

    以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:數據鏈路層和層,並將其細分為一些功能子層,包括數據鏈路層的llc (邏輯鏈路)子層和mac (介質)子層,層的pcs (編碼子層) 、 pma (介質附加子層)和pmd廈門大學碩士學位論文摘要(介質相關于層) 。
  6. In order to save the energy and based on the protocol of ieee 802. 15. 4, we add a timer to maintain the physical and mac layer automatically. our mac protocol can sleep and listen circularly to satisfy the goal of energy saving. in the consideration of the design the software of layers of network and application, we bring forward an idea to fulfill the function of routing and data fusion

    在設計過程中,本文首先基於ieee802 . 15 . 4標準,對層和mac層需要符合的標準的ieee802 . 15 . 4協議增加了定時器的自動維護工作,從而形成了我們自己的層、 mac層協議,解決了節點的媒體和定時休眠、監聽,達到了節能的目的;本文在網路層和應用層協議設計中,提出了路由表維護和數據融合的思想,並進行了設計的實現。
  7. In this paper the design of network security architecture for the state monitor and management information system of housing private foundation is presented, including the comprehensive consideration of physical security, network security, operation system security, application and supporting platform security, and information security, etc ; it is carried on to analyze possible security threats, vulnerabilities and their risks, and a design scheme of network security architecture, especially the network regulations which have been adopted in the system implement, is proposed

    本文對全國住房公積金監督管信息系統網路安全體系進行設計,包括對安全、網路安全、操作系統安全、應用系統及應用系統支撐平臺安全、信息安全等各個層面進行綜合考慮,並對其中的用戶認證與和網路隔離技術等關鍵技術進行了詳細分析。對網路中可能存在的安全威脅、安全脆弱點、以及由此產生的安全風險進行了分析,提出了相應的網路安全體系設計方案,尤其是明確提出了網路規則。
  8. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管體繫上,依據法律法規,定了行之有效的規章度。
  9. This paper mainly introduced switcher realization scheme. and this paper traversed store - and - forward technology, medium access control and physics sublayer technology, which are the keys technologies of fast ethernet switcher

    論文主要介紹了快速以太網交換機的實現方案,並詳細講述了實現快速以太網交換機的存儲轉發技術、介質技術和層技術等關鍵技術。
  10. It becomes more difficult to manage, integrate and share the control system real - time data when we set up the industrial real - time database because of complicated affair between every department and isomeric character of the system. a three - level - structure model and the method to establish database is provided based on corba criterion with its character of being regardless of programming languages, hardware platform and network protocol. a universal real - time database faces multi - system is also set up by learning the distributed criterion, it can realize the request broker, and the application software can visit the database pellucidly ; thus the power station simulation model can be linked with the control system such as infi90, ovation and be made use of the control object, a closed simulation and control experiment system is set up

    在創建工領域實時數據庫時,企業各部門間的復雜事務及內部異構性給實時數據的管、集成和共享帶來了一定的困難,根據corba規范具有語言無關性、平臺無關性和網路協議無關性的特點提出基於分散式計算規范corba的三層體系結構模型及建立與維護實時數據庫的方法和途徑;通過corba規范建立面向多個分散系統的通用實時數據庫,實現數據,使應用軟體可以透明地對實時數據庫進行、存取、管;將infi90 、 ovation分散系統與火電廠模擬機模型進行有效的互連,以全過程模擬數學模型為對象,構建了閉環模擬實驗研究系統,實現數據的高效連通及管;進而通過基於corba的實時數據庫構建一個從火電廠模擬機對象到過程式設備再到sis系統的綜合自動化試驗平臺。
  11. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從安全、、通信加密、數據保護、安全審計、病毒防護、安全備份和安全管等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市電子政務信息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。
  12. Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "

    根據涉密信息網路對安全的特殊性,根據國家對涉密信息網路安全的相關規范,筆者對x所的信息網路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照信息系統安全工程的方法設計了針對該所整個信息網路系統安全、網路運行安全、信息安全保密以及安全保密管等方面的解決方案,完成了網路安全域劃分、防電磁泄漏、安全審計、網路安全管、信息傳輸加密和等工作。
  13. What ' s more, with fundamental research, the following solutions were put forward : database connectivity technology, which can help to implement this system which works in client / server mode, the way of using ole ( object linking and embedding ) to solve the storage and retrieval problems of blob ( binary large object block ) data type and the method of directly giving the database system ' s operating purviews to right users with the application of dbms ' s authentication mechanism, which help to control database ' s access

    這些關鍵技術包括數據庫連接技術,以實現客戶/服務器模式下的數據庫開發;用ole技術解決大文本數據存取題;結合dbms自身鑒別機,將數據庫系統權限賦予用戶,以用戶對數據的。最後,本文對南京流公司管信息系統的開發工作進行了總結,並展望了開發運輸類公司mis的發展方向。
  14. Information technology - telecommunications and information exchange between systems ; local and metropolitan area networks ; specific requirements - part 15. 3 : wireless medium access control and physical layer specifications for high rate wireless personal area networks

    信息技術.系統間遠程通信和信息交換.局域網和城域網.特殊要求.第15 . 3部分:高速率無線個人區域網用無線媒體層規范
  15. Information technology - telecommunications and information exchange between systems ; local and metropolitan area networks ; specific requirements - part 15. 4 : wireless medium access control and physical layer specifications for low - rate wireless personal area networks lr - wpans

    信息技術.系統間遠程通信和信息交換.局域網和城域網.特殊要求.第15 . 4部分:低速率無線個人區域網用無線媒體層規范
  16. In ejb container, entity bean is encapsulated by session bean, which nomalizes access of consumers, reduces coupling between business container and consumers, centralizes security manage and

    在業務層,以會話bean封裝實體bean ,規范化客戶,減少業務層和客戶端的耦合,集中安全管和事,提高了性能。
  17. With the flourish of wlan market, people are concerned about the wlan security more than ever. data transmitted in wlan over high frequency radio is subject to eavesdropping, furthermore, physical media access control measures do n ' t adapt to wlan

    在無線局域網市場急速擴大的同時,人們對其安全題愈發關注:無線局域網中的數據通過高頻無線電波傳輸,極易遭到竊聽,而且在無線網環境中,難以應用有線網路的物理訪問控制手段。
  18. The architecture of grid file system services specification spells out the hierarchical structure to facilitate federation and sharing of virtualized data from file systems in the grid environment by providing the virtual namespace that will allow association of access control mechanisms and metadata of the underlying physical data sources

    Architecture of grid file system services規范通過提供虛擬命名空間來訂層次結構(這樣可以在和底層數據源的元數據之間建立關聯) ,從而促進網格環境中文件系統中虛擬數據的聯邦和共享。
  19. When implementing the access controlling service, it is very essential to authenticate peers rapidly and correctly

    隔離技術實施過程中,必須對通信實體進行準確高效的身份認證。
  20. The safety refers to four layers : the physical layer, the network layer, the system layer and the application layer, which includes many contents such as network insulation, encryption, safety detection and monitoring, safety audit, virus protection, access control, identity certification, data copy and recovery, security management, etc. starting with the application layer of safety system, this article, based on j2ee, researches the privacy protection, completeness, facticity, availability and controllability of information in e - government

    其安全性涉及到級、網路級、系統級和應用級四個層次,具體包括網路隔離、加密、安全檢測與監、安全審計、防病毒、、身份認證、數據備份與恢復、安全管等幾十項內容。此課題從安全體系的應用層出發,基於j2ee技術,對電子政務系統中信息的保密性、完整性、真實性、可用性和可性等方面進行研究。
分享友人