理解訪問權限 的英文怎麼說

中文拼音 [jiěfǎngwènquánxiàn]
理解訪問權限 英文
access specifier
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 解動詞(解送) send under guard
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • 理解 : understand; comprehend
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 權限 : limits of authority [powers]; power; authority; within the power or right of; jurisdiction; compe...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源、口令應用以及建立備份等;確定系統管員的力和責任,包括物安全、系統配置、帳戶設置及使用、口令管、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的決方案,為其在配置、管和應用方面提供了基本的框架。
  2. It is responsible for deciphering class files and uploading into java virtual machine ; class verifier is used to the correct internal structure ; security manager is used to customize the access strategy and permission ; and ssl guarantees the data security during transmission. though modeling and testing a prototype system, experiment proved the correctness and efficiency of above design

    類裝載器是java安全體系的第一道防線,它負責將類密后裝入java虛擬機; class文件檢驗器保證裝載的class文件有正確的內部結構;安全管器主要用於定製用戶對系統的策略和;安全套接字用來保證web傳輸安全。
  3. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的和數據安全題,提出以視圖模式結合用戶識別審定實現數據劃分,以並發處、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入題,詳細討論綜合採用差錯控制、防火墻、數據加密密等技術手段提高系統的網路安全性能。
  4. What ' s more, with fundamental research, the following solutions were put forward : database connectivity technology, which can help to implement this system which works in client / server mode, the way of using ole ( object linking and embedding ) to solve the storage and retrieval problems of blob ( binary large object block ) data type and the method of directly giving the database system ' s operating purviews to right users with the application of dbms ' s authentication mechanism, which help to control database ' s access

    這些關鍵技術包括數據庫連接技術,以實現客戶/服務器模式下的數據庫開發;用ole技術決大文本數據存取題;結合dbms自身鑒別機制,將數據庫系統賦予用戶,以控制用戶對數據的。最後,本文對南京物流公司管信息系統的開發工作進行了總結,並展望了開發運輸類公司mis的發展方向。
分享友人