訪問控制措施 的英文怎麼說

中文拼音 [fǎngwènkòngzhìcuòshī]
訪問控制措施 英文
access control measures
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : 動詞1 (安排; 處置) arrange; manage; handle 2 (籌劃) make plans 3 [書面語] (施行) execute; a...
  • : Ⅰ動詞1 (實行; 施展) execute; carry out 2 (給予) exert; impose 3 (施捨) give; hand out; best...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  • 措施 : measure; step
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護:存取、標識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. These measures include how a user to log in manufacturing application system under web pages, how to control the resource access on the same web page, how to control the divulgence of the anchor link information of the hyperlink and how to control browser bookmark function ' s access to old pages

    ( 3 )提出了基於web頁面方式的製造應用系統用戶界面下,用戶的安全登錄、對同一個頁面上的資源進行超鏈接錨點鏈接信息的泄漏、瀏覽器書簽功能對頁面的等頁面資源安全
  3. If kept the existing station, the corporation needs do some research on the control system of service quality and find the existent problems in order to promote the control level of service quality and seek the continual development of the hotel. service quality is the lifeline of hotel management. control system of service quality is the important part of the management system of service quality and an important matter in doing well the management of service quality in hotel

    本文通過運用卷調研和談等研究方法,結合一定的服務質量管理的理論,對青島海景花園大酒店服務質量系統進行實證分析,筆者認為,切實提高服務質量系統各環節的有效性,採用人性化的服務質量方法是改進和優化「海景」服務質量系統的最主要
  4. Is an effort to define an access control framework for xml data

    是一種為xml數據定義框架的
  5. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術,包括;身份認證、密碼、、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,定了行之有效的規章度。
  6. For the above reason, new security mechanism for wlan is necessary to make sure the data in transmission confidential, complete and undeniable. at the same time, it should provide identity certification and access control. the 802. 1x fulfils all the above requirements, which provides an upgraded certification and authentication method for controlling lan users ’ access through port - based certification

    然而常規的無線局域網安全如wep等都已被證明不再安全,人們已經認識到必須專門為wlan設計新的安全防護機,以保護在wlan中傳輸數據的機密性、完整性和不可否認性,同時對請求接入wlan的用戶進行身份認證和
  7. To sum up, there are several innovative researches in this paper as follows : 1. this paper researches on the standard of security operating system. with the features of the embedded system such as resource limit, security safeguard functions of embedded operating sysmtem are defined in terms of b1 level

    文中著重對以下幾個方面進行探索和創新: 1 ) 、研究安全操作系統的安全標準並結合嵌入式系統資源有限等特徵,界定了b1級安全嵌入式操作系統應提供的安全保障功能; 2 ) 、研究了嵌入式網路安全的重要性及其保護,識別出了嵌入式操作系統層面最後一道網路安全門檻,在socket層實現了強
  8. The encrypting file system ( efs ) in windows 2000 complements existing access controls and adds a new level of protection for your data

    Windows2000的加密文件系統( efs )補充了現有的權限,並為數據添加了一級新的保護
  9. Based on this, this paper provides a security strategy related on network, and gives the security measures for the network in pangang automation company, they are management measure, organization vlan, data backup, limiting authority of access, the self - protection of legal user, prevention and cure of virus, and the emergency process plan

    在此基礎上,本文提出了計算機網路的安全策略,提出了攀鋼自動化公司計算機網路的安全,即管理、組建vlan 、數據備份、權限、合法用戶自我防範、病毒防治以及定應急處理方案,取得了較好的實際效果。
  10. Web server architectures based upon traditional web server and web cluster with embedded modules have been constructed, and the implementation methods of differentiated services are provided. the critical functions which include class identification, resource management, requests scheduling ar. d admission control are specifically analyzed, and the works on improving resource utility and reducing resource overhead on refused requests are also discussed. 3

    通過嵌入模塊方式基於傳統web服務技術構建了支持區分服務的web服務模型,從技術層次對區分服務的實現進行了詳細論述,重點討論了業務類的請求識別、資源管理、請求調度和等的技術要求和實現方法,並進一步分析了提高資源利用率和降低無效請求資源消耗的
分享友人