access management 中文意思是什麼

access management 解釋
存取管理
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • management : n. 1. 辦理,處理;管理,經營;經營力,經營手腕。2. 安排;妥善對待。3. 〈the management〉〈集合詞〉(工商企業)管理部門;董事會;廠方,資方。
  1. The users are managed based on roles and grades, the types of users are : anonym, student, teacher and administrator, implement secure management by setting access control privilege specially

    用戶管理採用基於角色的分級管理模式。將用戶主要分為匿名用戶、學生、教師和管理員四種類型,通過對其分別設置訪問控制權限來實現安全訪問和管理。
  2. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對存儲管理系統中要保存諸多同類信息、佔用內存大的問題,同時考慮到能夠實現進程間的數據訪問,提出,設計並實現了entry管理庫,從而大大降低了內存的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了一種解決災難恢復的方案,同時相對于單個volume的操作,以組為單位操作,簡化了用戶的操作。
  3. Second, based on integrating networks of mobile management, the thesis modifies the access protocols of umts ps to build the transmission bearer cannel of data and signaling and guarantee the seamless connection of maent and umts. then, using adov routing protocol with mip, the thesis builds the emulation model of integration network and analyzes the throughput of network in ns

    然後,在ns ( networksimulation )模擬環境中,利用基於移動網際網路絡協議( mobileinternetprotocol , mip )的按需距離向量路由協議( adhocon - demanddistancevectorrouting , aodv )對整合通信網路模擬建模,並對整合通信網路的網路吞吐量進行了分析。
  4. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  5. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當網路配置后,授權用戶就可以在任一internet終端實現對監控主機的訪問和控制,以進行調度優化,遠程診斷與維護。目前,這套工業遠程信息監控系統已在省計算機重點實驗室進行了運行測試,系統工作正常,達到了預期要求。
  6. Intelligent pulse code modulation ( inpcm ), one of the new access device, is a promising hi - teach boasting of economization, and need network management to realize its intelligence

    智能pcm ( inpcm )是一種具有廣闊發展前景的新型接入設備,需要網路管理系統來實現其智能化。
  7. Research on access token management for hf channel

    短波通道接入令牌管理策略的研究
  8. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  9. Security management of corporation lan user access

    企業內部網用戶接入的安全管理
  10. Similarily, according to the dsp data access pattern and design philosophy of md32, a data memory combined data cache and data rani is proposed. in the md32 rtos, memory management system is one the most important part

    同時,針對dsp中數據訪問的特點和md32同時兼顧dsp與risc特性的設計特點,設計了包含數據ram和數據cache的數據存儲系統,並對給出了數據存儲系統的訪問規則。
  11. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  12. Management data, boston, usa, 1984, pp. 47 - 54. 3 beckmann n, kriegel h - p, schneider r, seeger b. the r - tree : an efficient and robust access method for points and rectangles. in proc

    對cdt索引來說,首先高維數據點通過k平均聚類演算法得到若干類,然後分別計算該點對應的始點與質心距離,並且將這兩個距離通過線性組合得到該點的復合索引鍵值。
  13. In order to change the unscalable condition of the current virtual venue server ' s design in the access grid, this paper gave a detail multi - virtual venue servers model, which introduced the concept of group and is more scalable and flexiable. this paper also gave the main interfaces of the new group management service. after this, this paper did a simulating implementation of the multi - virtual venue servers model

    文中提出了多虛擬會場服務器的設計彌補了目前虛擬會場服務器設計的不具有可擴展性的缺陷,提出了組服務器的概念,給出了組管理服務的主要介面,並且在ezvideochat系統中對多虛擬會場服務器模型進行了模擬實現。
  14. Condor - g integrates condor ’ s eximious job management functions into globus ’ secure communication among domains protocol and standard remote batch process system access protocol, and help the condor users to use globus resources

    Condor把自身出色的作業管理功能和globus的域間安全通信協議及遠程批處理系統的標準化訪問協議相結合,就形成了condor - g軟體系統,使得condor系統的用戶也可以很方便的使用globus資源。
  15. At the same time, combined with the current situation and development trend of computer, communication and information management, the author advanced the basic frames and functions for designing the office automation. in this research, we advanced an office automaton project based on lotus domino / notes and realized the main parts : constructed the collaboration flat based on lotus domino, developed the data interface by which nonstructural notes database can access structural relative database, based on this, intergrated the organization workflow, information management and the other operation systems into one flat, then multilayerly disposed and used the information very expediently, laid the groundwork for communicating the information circulatio n inside and outside the organization and realizing the non - paper work.

    在本課題的研究中,提出了一種基於lotusdomino notes平臺的辦公自動化方案,並實現了該方案中主要部分:搭建了基於lotusdomino的協作平臺,開發了非結構化的notes數據庫訪問結構化的關系數據庫的數據庫數據訪問介面,以此為基礎,將組織中的工作流、信息處理以及其它業務系統都集成到一個協作平臺上,從而較便捷地對信息進行多層面的處理與使用,為溝通組織內、外信息的流通,實現無紙辦公奠定了基礎。
  16. Market access management, adjust original country that foreign bank introduces rationally ; develop affiliates energetically and limit the individual proprietorship bank properly ; adjust distributing area foreign bank, promote national balanced development. 2

    在市場準入方面,合理調整外資銀行引進的國別分佈;大力發展合資銀行,適當限制獨資銀行;調整外資銀行的地區分佈,促進全國均衡發展。
  17. Not only does access management preserve the transportation functions of roadways, it also helps preserve long - term property values and the economic viability of abutting development

    出入口管理不僅保證了道路的交通運輸功能,而且還保證了臨街開發的長期地產值和經濟生存能力。
  18. Section 2 studies the database access management technology based on microsoft sql server 2000 which is the nuclear technology of database management module in data synchronization system sever, and emphisizes on ole db database access technology. section 3 introduces two kinds of block cipher algorithm used in data synchronization system. : gost algorithm and rijndael algorithm, meanwhile offers interfaces in which encryption algorithm can be userdefined. this is the necleus of encryption module in data synchronization system server and client. section 4 studies network transmission management technology. this section mainly explores programming model and the network interface technology using completion ports to develop server which is the key technology of network transmission management module in data synchronized system server and client. section 5 introdues the brief using approach in data synchronized system server and client as well as some improvement suggestion

    第二部分研究了基於microsoftsolserver2000的數據庫訪問管理技術,著重介紹oledb數據庫訪問技術。它是數據同步系統服務器端數據庫管理模塊的核心技術。第三部分介紹了數據同步系統中利用的兩種分組密碼演算法: gost演算法和rijndael演算法,同時給出了一個用戶可以自定義加密演算法的介面。
  19. The purpose of access management is to provide vehicular access to land development in a manner that reduces the problems of safety and efficiency attributable to unmanaged vehicular access

    出入口管理目的是為土地規劃開發提供合理的車輛出入口,以減少由於車輛出入口管理不善出現的安全和運行問題。
  20. The reader can identify epc gen 2 tag. it widely used in vehicle access management etc personnel access management logistics control manufacture automation etc. data collection system

    該讀寫器廣泛應用於車輛門禁管理不停車自動收費etc人員門禁管理物流監控生產自動化管理等數據採集系統。
分享友人