訪問控制信息 的英文怎麼說

中文拼音 [fǎngwènkòngzhìxìn]
訪問控制信息 英文
access control information
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺涉及存儲方式、權限、用戶身份驗證、密碼和日誌管理等諸多題;傳輸安全主要研究加密傳輸方案的選擇和實施。
  2. An access control policy suitable for mis

    一種適用於管理系統的策略
  3. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全,用以提高系統的安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、和檢索電子文檔的方法,使得企業集成平臺的電子文檔獲得安全、可靠、快速的
  4. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據通用框架( gfac )方法,實現了基於hru模型的細粒度自主、基於bell - lapadula模型多級安全規則的強以及基於biba模型的強等多種安全策略,從而有效地增強了操作系統中的保密性和完整性。
  5. These measures include how a user to log in manufacturing application system under web pages, how to control the resource access on the same web page, how to control the divulgence of the anchor link information of the hyperlink and how to control browser bookmark function ' s access to old pages

    ( 3 )提出了基於web頁面方式的製造應用系統用戶界面下,用戶的安全登錄、對同一個頁面上的資源進行超鏈接錨點鏈接的泄漏、瀏覽器書簽功能對頁面的等頁面資源安全措施。
  6. Xml security : control information access with xacml

    Xml安全:使用xacml
  7. Control information access with xacml

    使用xacml
  8. There are three parts in material implementation : access control information, access control enforcement facility and access control decision facility

    具體實現主要分為三部分:訪問控制信息執行模塊和決策模塊。
  9. Skynet personal firewall edition is the use of the personal computer network security procedures, according to managers to set rules to guard the security network, provide powerful access control, information filtering and other functions, help you ward off network intrusions and attacks, prevent information leakage

    天網防火墻個人版是個人電腦使用的網路安全程序,根據管理者設定的安全規則把守網路,提供強大的過濾等功能,幫你抵擋網路入侵和攻擊,防止泄露。
  10. User can access the information which accord with he ' s status

    這樣網路中各政府機關根據用戶的訪問控制信息進行自己資源的授權。
  11. Gets or sets the file or directory in which access control information can be viewed

    獲取或設置可在其中查看訪問控制信息的文件或目錄。
  12. Gets or sets the file or directory in which access control information can be changed

    獲取或設置可在其中更改訪問控制信息的文件或目錄。
  13. The absolute path of the file or directory in which access control information can be viewed

    可在其中查看訪問控制信息的文件或目錄的絕對路徑。
  14. You can then populate the object with access control information and apply it to a file

    然後可以使用訪問控制信息填充該對象,並將其應用於文件。
  15. The absolute path of the file or directory in which access control information can be changed

    可在其中更改訪問控制信息的文件或目錄的絕對路徑。
  16. You can then inspect, add, or delete the access control information for the specified file

    然後您可以檢查、添加或刪除該指定文件的訪問控制信息
  17. You can then populate the object with access control information and apply it to a directory

    然後,您可以使用訪問控制信息填充該對象,並將其應用於目錄。
  18. This constructor retrieves the access control information for the specified file and then creates a

    此構造函數檢索指定文件的訪問控制信息,然後創建一個封裝該
  19. In order to improve system performance, a general cache to preserve access control information is built upon split trees inside the secure kernel

    為提高系統性能,可以在安全內核中創建一個以分裂樹為基礎的訪問控制信息通用緩存。
  20. Mac, nist - rbac access control model ; 2. analyzes the access control needs of the applied electronic government system ; 3. uses the language of uml to proceed the detailed design to the system of rbac ; 4, uses the language of xml to describe access control information to the model of rbac and illustrates alternant techniques of xml realization in the distributed type of network environment ; 5

    設計部分,本文做了如下工作: 1 、對dac 、 mac 、 nist - rbac模型進行了分析比較; 2 、分析了電子政務應用系統的需求; 3 、用uml語言對rbac系統進行了較為詳細的設計; 4 、用xml語言對rbac模型的訪問控制信息進行了描述,並闡述了分散式網路環境下xml交互的實現技術。
分享友人