The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
New access-control methods will also be introduced as research into operating system security continues.
随着对操作系统安全性的深入研究,将会引入新的访问控制方法。
Security is also an issue; SimpleDB's access control system is similar to S3's.
安全性也是一个问题;SimpleDB 的访问控制系统类似S3。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
By using access control matrix, we can achieve the real time and dynamic control of task, which ensures the system security.
通过引入访问控制矩阵,实现了对任务的实时、动态的控制,从而确保了系统的安全。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control.
本章描述了ASP和网络化制造系统的安全性问题,尤其是用户访问控制的问题;
People use it to separate the management of system from security in the access control system.
在一些最早的存取控制系统中,人们用角色来分隔安全管理和系统管理。
Integration of rural credit cooperatives' credit management system, the generic data access interface and security control implementation of the three-tier framework are analysed and researched.
结合农村信用社信贷管理系统,对三层构架中的通用数据访问接口和安全控制实现进行了分析研究。
The system meets the demands of uniform authorization and access control, possessing the merits of good security, high flexible and easy to management.
该系统满足了统一授权和访问控制的需求,具有安全性好、灵活性高、便于管理等特点。
Access control mechanism is an increasingly important content in security policy of distributed workflow management system.
访问控制机制是分布式工作流系统安全策略中的核心内容。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
There are hidden dangers caused by Access Control in the running SOS, for improving security of the operating system other methods must be combined with.
在实际SOS中这三种存取控制方式还能引起安全隐患,必须结合其他的安全措施和方法来提高操作系统的安全性。
The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.
该系统的访问控制框架的结构与具体实现方法无关,能够满足群应用的不同安全要求以及动态群对安全性要求的变化。
The structure of the system, mail service protocols, mode of messaging, allocation of mailboxes as well as personal security for authentication and access control measures are discussed in this paper.
文中论述了该系统的结构、邮递服务协议、邮递方式、信箱的管理及信件的保密和存取控制手段等问题。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.
完善的安全体系,采用灵活的基于角色的访问控制模型,实现灵活的访问控制体系。
It made information system, from access system to operate database and sign badge, all these things under security control.
使该所信息系统从用户访问系统,到操作数据库与具体实现签章等工作,都处在系统安全控制之下。
The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.
对于信息系统的安全性一般包括:数据完整性、数据保密性、身份确认和认证、访问控制、不可否认性等几个方面。
In security design, access control is used to enhance the security of the system.
本文在设计上采用访问控制技术,以提高系统的安全性。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
Access control is an important technology in system security.
访问控制是系统安全的重要技术。
Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.
为实现信息系统的安全目标,需要系统能够提供相关的安全服务:身份标识与认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。
There are two aspects included in database system security, which is access control security strategy and communication channel security.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
应用推荐