data access security 中文意思是什麼

data access security 解釋
數據存取安全性
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The globus toolkit has been developed since the late 1990s to support the development of service - oriented distributed computing applications and infrastructures. core gt components address, within a common framework, fundamental issues relating to security, resource access, resource management, data movement, resource discovery, and so forth. these components enable a broader " globus ecosystem " of tools and components that build on, or interoperate with, gt functionality to provide a wide range of useful application - level functions

    Gt globus toolkit是面向服務的分散式計算應用和基礎設施的開發工具,它以上世紀九十年代以來的許多分散式系統和技術為基礎,其中較有影響的是過去十幾年的metacomputing , legion和i - way等創新項目,以及當前的web service ,虛擬機和peer - to - peer架構等技術。
  3. In one typical use of code access security, an application downloads a control from a local intranet host web site directly to the client so that the user can enter data

    在代碼訪問安全性的一種常見應用場合中,應用程序將控制項從本地intranet宿主網站直接下載到客戶端,以便用戶能夠輸入數據。
  4. For wireless communications, direct sequence code division multiple access ( ds - cdma ) techniques have received a great deal of attention due to the expectation of capacity increase, interference rejection capability, security, and so on. in a high data rate application such as multimedia services, however, the capacity of ds - cdma systems is limited by both the inter - chip, or inter - symbol interference

    Cdma技術以其高抗干擾能力、高容量、高保密性等技術優勢在第三代移動通信系統中被廣泛應用,然而在高速數據業務中,嚴重的碼間干擾和符號間干擾會導致系統性能明顯下降。
  5. They cover various issues including ethics and data privacy policy, data classification policy, access control policy, technical measures for protection of customer personal data, location security, staff security and transfer of customer personal data

    守則內容涵蓋多個層面,包括操守及資料私隱政策、資料分類政策、取存資料管制政策、保障顧客個人資料的技術措施、儲存資料地點的保安、員工的保安及顧客個人資料轉移的保安。
  6. Sql server mobile supports merge replication, remote data access, and security planning and implementation at the server

    Sql server mobile支持在服務器上進行合併復制、遠程數據訪問以及安全規劃和實施。
  7. However, the ease with which employees can publish data worldwide requires is to carefully consider data access policy and security, users reported

    然而,用戶們報告稱,利用(內部網的) ,雇員們能向全世界范圍出版發行數據的簡便性,需要信息系統部門仔細地研究數據訪問政策和安全保障。
  8. This paper stresses on discussing the architecture, access protocol and implementation mechanism based on xml and web services technologies, researches key technologies of metadata information service and data uniform access and management in database grid, designs and implements distributed mis subsystem and das subsystem, which support multi - domain management. mis can provides metadata information for the whole system, such as das and clients, it uses domain name 、 logical name and internal name of data object to uniformly name database resources in grid and implements name mapping mechanism and user view metadata information service and provides virtual organization and management of database resources. das can provide a scalable uniform data access by virtual organization and management of storage resources and multi - mode data share access mechanism, thus integrate database resources in grid and shields distribution and heterogeneity of resources and achieves transparent access. system adopts data access mechanism based on user request mapping to flexibly implement data access across multi domains, and adopts distributed data cache mechanism 、 security mechanism based gsi to provide high - performance secure data service for grid users

    本文論述了griddaen - dai系統的邏輯結構、訪問協議、數據服務流程以及基於webservices 、 xml等技術的實現策略,重點研究數據庫網格中的元服務、數據統一訪問和管理等關鍵技術,設計和實現了支持多管理域的分散式元服務子系統和數據訪問服務子系統。其中元服務主要為整個系統提供各種元信息支持,它採用域名、數據對象的邏輯名稱、物理名稱和內部名稱對廣域環境下的數據庫數據進行了統一命名,實現了相應的名字映射機制和全局的用戶數據視圖服務,提供了數據庫資源的虛擬組織與管理方式;數據訪問服務通過提供可擴展的統一數據訪問和支持多種數據共享訪問模式,屏蔽了數據庫資源的分佈性和異構性,為用戶提供了統一透明的數據服務。
  9. In recent years information industry based on computer and network gains unprecedented development and proposes a higher requirement for the technology of information storage. it is mainly embodied in the following aspects : memory capacity of mass date, reliability of memory system, adaptability to different types of data storage, high bandwidth and security of data access and providing effective solution to data memory

    近年來以計算機和網路為基礎的信息產業獲得了空前的發展,對信息的存儲技術提出了更高的要求,其主要表現在:海量數據的存儲容量;存儲系統的可靠性;對不同數據存儲類型的適應性;數據訪問的高帶寬和高保密;以及提供有效的數據存儲解決方案。
  10. On data access security of the storage area network

    存儲區域網路的數據安全訪問
  11. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對電子政務系統網路的安全進行了分析,其中包括網路的安全風險分析、安全需求分析、安全目標分析,以及電子政務的安全策略分析;然後,從物理安全、訪問控制、通信加密、數據保護、安全審計、病毒防護、安全備份和安全管理等方面對電子政務網路安全解決方案進行了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市電子政務信息網路的風險分析及安全需求分析,對其網路安全的整體解決方案進行了詳細設計。
  12. Provided for. net framework data provider code access security attributes

    為. net framework數據提供程序代碼訪問安全屬性而提供。
  13. Download details : microsoft data access components mdac security patch ms03 - 033

    下載詳細信息: microsoft數據訪問組件mdac安全修補程序ms03 - 033
  14. Download details : security update for microsoft data access components 2. 8 kb911562

    下載詳細信息: microsoft數據訪問組件2 . 8安全更新程序kb911562
  15. Based on the analysis of the challenge problems, such as login security, data access, the interruption of exam, in current remote exam system which is an important part of distance education, this article designs an asp. net - based remote exam system to solve these problems and discusses the key technologies

    遠程考試系統是遠程教育的重要組成部分,本文對目前已存在的遠程考試系統的安全登錄、數據存儲和考試中斷加以分析,提出相應的解決辦法,同時對部分關鍵技術進行了研究。
  16. Different data sources usually have different security requirements or users, so defining the data access for the integrated warehouse data can be difficult

    不同的數據源通常具有不同的安全性需求或用戶,因此為集成的倉庫數據定義數據訪問可能十分困難。
  17. Data service layer, including data access service layer, data access control layer and data access security mechanism, works to ensure the security and control of the access of service handling to the data in enterprise information platform

    數據服務層包括數據訪問服務層、數據訪問控制層和數據訪問安全機制,由數據服務層來保證業務處理對企業信息平臺數據訪問的安全和控制。
  18. Based on detailed analysis of security framework of j2ee and jboss, the thesis gives description of security problem from data and data operation aspects, and provides a data transmission solution based on rmi plus ssl, a data access control solution based on wwwwwh ( who, where, when, what, which, how ) security policy. the real system provides the security solution through proxy, which not only assures the high security of the system, but also improves the flexibility of the system

    本文在分析了jzee和jboss的安全框架的基礎上,從數據與操作兩個方面對ip網路管理系統存在的安全問題進行了剖析,並從數據安全和系統效率的角度提出了rmi + ssl的安全數據傳輸方案、基於wwwwwh ( who , where , when , what , which , how )的訪問控制策略,並以安全代理模式實現了上述解決方案,從而不僅保證了數據傳輸和訪問的高安全性,也加強了系統的靈活性。
  19. Fortunately, the db2 database system and db2 data warehouse center provides very comprehensive data access security service, which makes data warehouse security much easier

    幸好db2數據庫系統和db2 data warehouse center提供了極其廣泛的數據訪問安全性服務,這使得維護數據倉庫的安全性變得更容易。
  20. Provides guidelines for improving the security of data access in asp. net web applications

    提供有關準則,說明如何提高asp . net web應用程序中數據訪問的安全性。
分享友人