用戶安全級別 的英文怎麼說

中文拼音 [yòngānquánbié]
用戶安全級別 英文
user security level
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 名詞1 (單扇的門 泛指門) one panelled door; door 2 (人家; 住戶) household; family 3 (門第) f...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (等級) level; rank; grade 2 (年級) any of the yearly divisions of a school course; gra...
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • 用戶 : user; subscriber; consumer; party; purchasers; abonement
  • 級別 : rank; level; grade; scale; sort; rating
  1. The users are managed based on roles and grades, the types of users are : anonym, student, teacher and administrator, implement secure management by setting access control privilege specially

    管理採基於角色的分管理模式。將主要分為匿名、學生、教師和管理員四種類型,通過對其分設置訪問控制權限來實現訪問和管理。
  2. Ntfs helps provide file protection based on users and groups, and only allows users with administrative privileges for a particular level to edit security configuration files

    Ntfs幫助提供基於和組的文件保護,並且只允許具有特定的管理特權的來編輯配置文件。
  3. By the role number of role authorization table, certification server can use different security - class identification technologies according to diverse users dynamically, and decides responding authorization with the identification results

    通過角色授權表中的角色數字,認證服務器能夠對不同動態地採不同的認證技術,並能根據認證結果做出授權判斷。
  4. Mssql substructure. provides a modular set of user, group, and object level permissions that function independent of the inherent mssql security. desigened to drop into any database aplication

    該軟體提供了獨立於mssql自帶機制的功能,提供了模塊化設置組以及對象訪問許可的機制。
  5. Manual configuration of large amount of distributed firewalls, as the access control enforcement points, can not meet the global security requirements in the open and dynamic environment, and make such burden to the administrator ; a variety of multiple clients may need different restricted access rules according to their requirements of quite different security levels, and these rules need to be generated centralized

    作為訪問控制實施點的每個客端網卡,如果採人工配置,不僅會導致龐大的工作量而且不能滿足整個動態局域網的要求;網路上各個客端的不同,所以不同訪問策略規則需要集中制定。
  6. Code access security policy configuration state consists of three administrative policy levels : enterprise, machine, and user policy

    代碼訪問性策略配置狀態分為三個管理策略:企業、計算機和策略。
  7. Mapping table of user and role is established through their relevance, and authorizing table of role and table is obtained in terms of map relevance among role, database, database table. by the role ' s flag number, certification server dynamically applies different secure identification technique to give identification to users, and gives authorization decision according to result of identification. the method realizes authorization through program, and is not dependent on concrete database

    根據與角色的映射關聯來獲得和角色的映射表,根據角色、數據庫和數據庫表映射關聯來獲得角色和數據庫表的授權表,通過角色的標識數字,認證服務器動態採不同的認證技術對進行認證,並能根據認證結果作出授權判斷,這種方法使程序來實現授權而不需依賴于具體數據庫。
  8. To administer security policy for the enterprise, machine, or user levels

    來管理企業、計算機策略。
  9. It solves payment issue through sharing pos and brush card. it solves info sharing and exchanging problem by enterprise application integration it adopts research method of software engineering and uses touch - screen, network, database technology and so on to carry through total design of the system and build the software : it uses user status identify and responsibility control to ensure database and application program ' s security ; it strengthen the code by coding optimize ; it captures and discards application runtime error to enhance the system ' s stability ; it uses multimedia voice and moving picture to show help information, thus makes the system easy to use ; it greatly reduces the maintenance work of the system by self - updating function ; it is an opening system by using star - model network top structure, supporting standard network communication protocol ? tcp / ip and offering standard software interfaced criterion

    論文採軟體工程的研究方法,使觸摸屏、網路、數據庫等技術,進行了系統總體方案設計和軟體開發:通過對數據庫和應程序的身份識和權限控制,保證數據存取和應程序的性;通過對代碼進行優化提高了代碼的健壯性;通過捕捉並拋出系統運行時的異常錯誤提高了系統的穩定性;通過多媒體語音、圖形和動畫提示幫助信息來增強系統的易性;客端程序自動升功能提高了系統的可維護性,有效地減少了維護工作量;系統採星型的網路拓撲結構,支持標準的tcp ip網路通訊協議和規范的軟體介面標準,具有良好的開放性。
  10. This policy is intersected with policies defined by the administrator at the enterprise, computer, and user levels to determine the full set of permissions granted to the code

    管理員也會在企業、計算機和定義一些策略,以確定向代碼授予的部權限,這些策略和應程序域策略之間存在相交的情況。
  11. Security policy levels : enterprise, machine, user, and application domain

    策略:企業、計算機、以及應程序域。
  12. Windows forms features a security model that is code - based security levels are set for code, regardless of the user running the code

    Windows窗體以一種基於代碼的模型為特色(為代碼設置了,而不論運行代碼的是什麼人) 。
  13. User level administration is appropriate in some situations to tightening security

    在某些情況下,適于使管理來收緊性。
  14. The wireless user can determine a security domain for that application based on the trust level of the provider

    無線可以根據供應商的可信來確定該應程序的性域。
分享友人