• The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.

    主要介绍网络安全准入控制系统组成相关技术技术铁路信息系统中如何应用加以探讨

    youdao

  • These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    youdao

  • However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.

    不过不必担心安全问题因为文件系统访问控制机制通常都可以提供充分的保护。

    youdao

  • Access control. Enables the system to recognize security policies for groups of users.

    访问控制使系统能够识别用户安全性策略

    youdao

  • Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    或许需要访问现有库存控制系统客户数据库基于大型机安全性访问控制服务

    youdao

  • New access-control methods will also be introduced as research into operating system security continues.

    随着对操作系统安全性的深入研究引入新的访问控制方法

    youdao

  • If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.

    如果谨慎地控制文件系统访问权限,用户只需手工编辑配置文件,就可以破坏产品安全性控制(比如审计)。

    youdao

  • By using access control matrix, we can achieve the real time and dynamic control of task, which ensures the system security.

    通过引入访问控制矩阵实现了对任务实时、动态控制,从而确保了系统的安全。

    youdao

  • Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.

    网络安全目前信息系统应用重要研究方向如何确定用户身份控制用户对信息资源的访问,是其中的一个重要问题。

    youdao

  • We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control.

    本章描述ASP和网络化制造系统安全性问题尤其是用户访问控制问题

    youdao

  • Integration of rural credit cooperatives' credit management system, the generic data access interface and security control implementation of the three-tier framework are analysed and researched.

    结合农村信用社信贷管理系统,对三层构架中的通用数据访问接口安全控制实现进行了分析研究

    youdao

  • The system meets the demands of uniform authorization and access control, possessing the merits of good security, high flexible and easy to management.

    系统满足统一授权访问控制需求具有安全性灵活性便于管理等特点

    youdao

  • Access control mechanism is an increasingly important content in security policy of distributed workflow management system.

    访问控制机制分布式工作流系统安全策略中的核心内容

    youdao

  • The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.

    操作系统安全信息系统安全基石访问控制则是操作系统安全机制重要内容。

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • There are hidden dangers caused by Access Control in the running SOS, for improving security of the operating system other methods must be combined with.

    实际SOS这三种存取控制方式还能引起安全隐患必须结合其他安全措施和方法提高操作系统的安全性。

    youdao

  • The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.

    系统访问控制框架的结构与具体实现方法无关能够满足群应用的不同安全要求以及动态安全性要求的变化。

    youdao

  • The structure of the system, mail service protocols, mode of messaging, allocation of mailboxes as well as personal security for authentication and access control measures are discussed in this paper.

    文中论述系统结构邮递服务协议、邮递方式信箱的管理信件的保密存取控制手段等问题。

    youdao

  • Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.

    设置用户存取权限控制冗余备份恢复网络安全等多种安全策略共同建立有机的安全体系

    youdao

  • Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.

    完善的安全体系采用灵活的基于角色访问控制模型实现灵活的访问控制体系。

    youdao

  • It made information system, from access system to operate database and sign badge, all these things under security control.

    使该所信息系统用户访问系统,操作数据库具体实现签章等工作,处在系统安全控制之下。

    youdao

  • The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.

    对于信息系统安全性一般包括:数据完整性、数据保密性、身份确认认证、访问控制不可否认性等几个方面。

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权访问控制服务、非否认服务、机密性服务、完整性服务。

    youdao

  • There are two aspects included in database system security, which is access control security strategy and communication channel security.

    数据库系统安全性主要包括两个方面访问控制策略传输通道安全

    youdao

  • If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.

    如果存在必须相应地使用文件系统中的代码访问安全机制访问控制列表来保护包含这些文件目录

    youdao

  • The use of the multiple functions of switch in access-control can realize the distribution security system, and implement the security management for the network and the users.

    利用中心交换机多种访问控制功能构建一个分布式网络安全交换体系实现网络用户接入的安全管理

    youdao

  • TPM based security USB disk system has access control functions, to maximize control over the use of USB disk.

    基于TPM安全优盘系统具有优盘访问控制功能最大限度控制移动存储设备的使用

    youdao

  • Based on the characteristics of real estate evaluation system, system security solution from identity authentication, access control and data backup are discussed.

    房地产评估系统特点出发身份认证访问控制数据库备份三个角度来考虑评估系统安全问题

    youdao

  • Based on the characteristics of real estate evaluation system, system security solution from identity authentication, access control and data backup are discussed.

    房地产评估系统特点出发身份认证访问控制数据库备份三个角度来考虑评估系统安全问题

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定