access control right 中文意思是什麼

access control right 解釋
訪問控制權限
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • right : adj 1 右,右方的,右側的,右派的 (opp left)。2 正當的,當然的 (opp wrong)。3 不錯的;正確的;...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Used to control access to nuclear weapons, retina identification has never caught on with the public because it requires the user to put their eyeball right up against a lens

    網膜辨識比較的是眼睛後方血管的模式,曾被用來管制核子武器的操控權,但是它始終未能風行,因為使用者得把眼球湊到透鏡上。
  3. 6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data

    6 )採用嚴格的訪問控制方式與權限管理機制。 fsca系統充分保證了用戶數據訪問的合法性與有效性。
  4. Class with the specified identity reference, access control type, and extended right identifier

    使用指定的標識引用、訪問控制類型和擴展權限標識符來初始化
  5. Class with the specified identity reference, access control type, extended right identifier, active directory security inheritance, and inherited object type

    使用指定的標識引用、訪問控制類型、擴展權限標識符、 active directory安全繼承和繼承對象類型來初始化
  6. File management has the function of 2 - level password management, including passwords of developers and users. this function allows developer to manage the access right to hardware and issue different access control rights to different users. 1

    檔管理系統具有2級密碼管理功能,包括開發商口令和用戶口令,開發商可以使用此功能對硬體的訪問許可權進行管理,可以對不同的用戶開放不同的訪問控制許可權。
  7. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出問題的發生可能
  8. Jdy - 280b double electromagnetic lock product characteristic : strong holding force, no left magnet easily installed, low noise, durable no mechanical failure with signal feed back function applications : can be used with intercoms and access control systems, especially for fireproof door working voltage : 12vdc 24vdc working current : 12vdc 0. 27a, 24vdc 0. 46a power consumption : 3. 3w, 3. 5w, absolutely insulative power supply mode : successively working temperature : - 40 50 dimension : 473 x 45 x 30mm weight : 3920g yiwu qimingxing computer company copy right

    Jdy - 280b雙開門磁力鎖產品特性:吸力強無剩磁安裝方便噪音低壽命長具故障保護功能,無機械故障可具資訊回饋功能鎖狀態有指示燈指示:鎖門時綠燈指示燈亮開門時,紅色指示燈亮帶鎖狀態指示燈及聯網信號輸出適用范圍:可與樓宇對講門禁系統配套使用特別適用於逃生門防火門電氣性能:電氣性能:使用電壓: 12vdc 24vdc電流: 12vdc 0 . 53a 24vdc 0 . 27a絕緣電阻測試: dc500v 1分鐘無擊穿通電形式連續使用溫度: 40 50外形尺寸: 473 x 45 x 30mm重量: 3920g
  9. Jdy - 280 electromagnetic lock with led product characteristic : easily installed, low noise and durable ; strong magnetic force, no magnet left when power off with led and network signal output built - in reverse wave protection function usage range : be used with intercoms and access control systems can be installed onto wooden door, metal door, glass door, fireproof door function : working voltage : 12vdc, 24vdc working current : 12vdc 0. 53a, 24vdc 0. 27a working condition : 40 50 working mode : cut off power to open wires are insulated, dc500v absolutely insulated in 1 minute. dimension of the magnet board : : 184 x 36 x 11mm dimension : 235 x 45 x 30mm weight : 1980g yiwu qimingxing computer company copy right

    Jdy - 280磁力鎖帶指示燈產品特性:安裝方便噪音低壽命長吸力強無剩磁內置反向突波保護功能適用於90開門,有門偵測信號帶鎖狀態指示燈及聯網信號輸出適用於樓宇對講門禁系統配套使用適用門型:木門金屬門玻璃門防火門電氣性能:工作電壓: 12vdc 24vdc工作電流: 12vdc 0 . 53a 24vdc 0 . 27a工作環境: 40 50工作方式:斷電開鎖鎖狀態有指示燈指示:鎖門時綠燈指示燈亮開門時,紅色指示燈亮絕緣電阻測試: dc500v 1分鐘無擊穿鐵板尺寸: 184 x 36 x 11mm外形尺寸: 235 x 45 x 30mm重量: 1980g
  10. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  11. Message queuing code access security defines queue - specific operations or queue access that an application might require which is subject to security control ; it does not represent a right for the application to perform these operations or receive access in and of itself

    消息隊列代碼訪問安全性定義應用程序可能需要的隊列特定的操作或隊列訪問(受到安全控制的制約) ;它不代表應用程序由其本身自行執行這些操作或接收訪問的權限。
  12. Secondly, it focuses on the technology of b / s mode developed on lotus domino / notes platfom. afterwards it presents a role - based access control model to sovel the problem of an normal document visited and operated safely by a different figure belong to a different department. and it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine

    接著重點研究了在lotusdomino / notes平臺上實現web訪問方式的技術特點,同時引入了基於角色的安全訪問控制模型,解決了不同部門、不同身份的用戶訪問不同的文檔信息和對文檔的安全操作,使辦公文檔得以安全控制;在角色的安全訪問控制模型的基礎上,提出了基於角色控制的安全工作流模型,使文檔在工作流引擎的驅動下,在網路環境中流向正確用戶。
  13. What ' s more, with fundamental research, the following solutions were put forward : database connectivity technology, which can help to implement this system which works in client / server mode, the way of using ole ( object linking and embedding ) to solve the storage and retrieval problems of blob ( binary large object block ) data type and the method of directly giving the database system ' s operating purviews to right users with the application of dbms ' s authentication mechanism, which help to control database ' s access

    這些關鍵技術包括數據庫連接技術,以實現客戶/服務器模式下的數據庫開發;用ole技術解決大文本數據存取問題;結合dbms自身鑒別機制,將數據庫系統權限賦予用戶,以控制用戶對數據的訪問。最後,本文對南京物流公司管理信息系統的開發工作進行了總結,並展望了開發運輸類公司mis的發展方向。
  14. Class with the specified identity reference, access control type, extended right identifier, and active directory security inheritance

    使用指定的標識引用、訪問控制類型、擴展權限標識符和active directory安全繼承來初始化
分享友人