data access control 中文意思是什麼

data access control 解釋
數據存取控制
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The abstract method and the design idea of separating presentation, control, business and data access founded deeply for enhancing system efficiency, implement and reusing

    Watool分離表示、控制、業務和數據存取的系統設計思想和高度科學的抽象方法,為提高系統效率,實現設計與復用奠定了良好的基礎。
  3. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    在數據鏈路層的設計中針對水下聲通道的特點,對于介質訪問控制協議採用了maca協議,它使用rts - cts控制報文握手機制來解決uan中的隱蔽終端、暴露終端以及功率控制問題。
  4. Broadband radio access networks bran - hiperlan type 2 ; conformance testing for the data link control protocol - part 1 : basic data transport function ; sub - part 3 : abstract test suite specification endorsement of the english version en

    數字表示法;出版物;出版;數字;文獻摘要本標準規定了出版物在涉及數字表示時間長度質量面積容積等量值和數字代碼時使用漢字和阿拉伯數字的體例。
  5. The medium access control ( mac ) layer protocol of the airlink interface between the mobile data base station ( mdbs ) and mobile end systems ( m - ess ) in cellular digital packet data ( cdpd ) is studied firstly. the access method of slotted non - persistent digital sense multiple access with collision detection ( dsma / cd ) is described mainly

    本文首先研究了蜂窩數字分組數據( cdpd )空中介面中的介質接入控制層( mac )協議,詳細論述了基於時隙的非堅持的、帶沖突檢測的數字載波偵聽多址接入協議( dsma cd ) 。
  6. This dissertation mainly introduces the key technology and innovative research of ws - dfs, such as web - based architecture, flexible component model, distributed local file storage unit, parallel access control and high efficiently organize and index for huge amount data

    本文主要論述基於web服務的分散式文件服務系統的關鍵技術及創新研究,包括體系結構、靈活的組件模型、全分佈的本地文件存儲單元、數據並發訪問控制和海量數據高效的組織和檢索等六個方面的研究成果。
  7. Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on

    基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密碼、條目的添加、刪除、修改、設置組、設置角色和設置訪問控制等,前臺頁面使用了樹型結構,直觀的反映了目錄服務器中數據的拓撲結構。
  8. You should pay attention to both the physical security of your mobile device and access control at the software level such as password protection, personal firewall settings and data encryption

    請留意擺放好你的流動設備,和啟動所需的軟體設定,例如加設密碼、安裝個人防火墻,及把有需要的數據加密,防止他人擅用你的資料。
  9. 2. a comprehensive framework is developed for the above model. those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on

    完整設計了模型的整個可實現框架:包括各組成模塊的功能、相關數據結構和消息編碼格式、證書管理庫和密鑰環的設計,以及具體的訪問控制流程等。
  10. Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic

    以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:數據鏈路層和物理層,並將其細分為一些功能子層,包括數據鏈路層的llc (邏輯鏈路控制)子層和mac (介質訪問控制)子層,物理層的pcs (物理編碼子層) 、 pma (物理介質附加子層)和pmd廈門大學碩士學位論文摘要(物理介質相關于層) 。
  11. Because the existing data model can ’ t work perfectly with given application, this paper brings forward domain data model ( ddm ). ddm ’ s structure is more fit for given applied field. it helps us to design and develop mis easily and it can solve the problem of data access control on applied layer

    本文針對現有的數據模型與具體的應用結合不緊密的特點,提出了構造更貼近具體應用領域的域數據模型,用於幫助mis的設計和開發,解決mis開發過程中,應用層面的數據訪問控制的難題。
  12. They cover various issues including ethics and data privacy policy, data classification policy, access control policy, technical measures for protection of customer personal data, location security, staff security and transfer of customer personal data

    守則內容涵蓋多個層面,包括操守及資料私隱政策、資料分類政策、取存資料管制政策、保障顧客個人資料的技術措施、儲存資料地點的保安、員工的保安及顧客個人資料轉移的保安。
  13. Data access control

    數據存取控制
  14. Aim at the characters of spatial data access control, the concept of spatial region access control based on spatial index was proposed

    摘要針對空間數據的訪問控制的特點,提出了基於空間索引的區域訪問控制概念。
  15. Analyze the systematic structure of the product data management system and study the object representation of the product data integration model, the product data attribute and operation, the product information modeling and the theory and method of access control modeling in order to set up the object model of the product data access control and describe the data base conversion of the object model and executive method

    分析產品數據管理系統的體系結構,研究產品數據的集成模型的對象表示,產品數據屬性和操作,產品信息建模和訪問控制建模的理論和方法;建立產品數據訪問控制的對象模型,並說明對象模型的數據庫轉換和實現方法。
  16. The authorization and access request rules and constraints of spatial region access control were defined, and the method of spatial data access control was described in detail

    給出了授權和訪問請求判斷的方法,建立了二維空間區域訪問控制模型。
  17. Data service layer, including data access service layer, data access control layer and data access security mechanism, works to ensure the security and control of the access of service handling to the data in enterprise information platform

    數據服務層包括數據訪問服務層、數據訪問控制層和數據訪問安全機制,由數據服務層來保證業務處理對企業信息平臺數據訪問的安全和控制。
  18. Then we propose an xml data access control system which uses extended xpath and user or user group information to define the access object. we describe the architecture, the subject, object, access rules and the different levels of the rules. and we also illustrate the access control process with an example

    在基於xml的數據訪問控制方面,本文提出了一個利用用戶、用戶組數據和擴展后的xpath進行訪問對象描述的xml數據訪問控制方案,對該方案的架構,訪問控制的主體、對象、授權規則和規則級別等進行了詳細的介紹,並給出了應用示例。
  19. Since the workflow management not only has to manage relationships and data flow among activities, but also has to manage resources needing by activities, data access control, versions of design object generating with workflow, function models, namely, document management based on workflow, version management of product structure and documents, access control management, are discussed and theirs realized principles and applications are presented also

    由於工作流管理不僅要管理活動與活動之間的關系和數據流向,還要對活動所需的資源、活動的訪問權限以及對隨工作流產生的設計對象的版本進行管理。論文還對基於工作流的文檔管理、產品結構和文檔的版本管理、權限控制管理的理論與應用進行了論述。
  20. Based on detailed analysis of security framework of j2ee and jboss, the thesis gives description of security problem from data and data operation aspects, and provides a data transmission solution based on rmi plus ssl, a data access control solution based on wwwwwh ( who, where, when, what, which, how ) security policy. the real system provides the security solution through proxy, which not only assures the high security of the system, but also improves the flexibility of the system

    本文在分析了jzee和jboss的安全框架的基礎上,從數據與操作兩個方面對ip網路管理系統存在的安全問題進行了剖析,並從數據安全和系統效率的角度提出了rmi + ssl的安全數據傳輸方案、基於wwwwwh ( who , where , when , what , which , how )的訪問控制策略,並以安全代理模式實現了上述解決方案,從而不僅保證了數據傳輸和訪問的高安全性,也加強了系統的靈活性。
分享友人