These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
By using access control matrix, we can achieve the real time and dynamic control of task, which ensures the system security.
通过引入访问控制矩阵,实现了对任务的实时、动态的控制,从而确保了系统的安全。
According the characteristic of furniture collaborative design, this system establishes task assignment mechanism and discussion region and sets up the access control and security.
根据家具协同设计的特点,建立了任务分配机制和设计讨论区,并实现了系统权限和安全性的设置。
The use of the multiple functions of switch in access-control can realize the distribution security system, and implement the security management for the network and the users.
利用中心交换机的多种访问控制功能,可构建一个分布式的网络安全交换体系,以实现对网络和用户接入的安全管理。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.
操作系统的安全是信息系统安全的基石,访问控制则是操作系统安全机制的重要内容。
Integration of rural credit cooperatives' credit management system, the generic data access interface and security control implementation of the three-tier framework are analysed and researched.
结合农村信用社信贷管理系统,对三层构架中的通用数据访问接口和安全控制实现进行了分析研究。
The system meets the demands of uniform authorization and access control, possessing the merits of good security, high flexible and easy to management.
该系统满足了统一授权和访问控制的需求,具有安全性好、灵活性高、便于管理等特点。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.
该系统的访问控制框架的结构与具体实现方法无关,能够满足群应用的不同安全要求以及动态群对安全性要求的变化。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
It made information system, from access system to operate database and sign badge, all these things under security control.
使该所信息系统从用户访问系统,到操作数据库与具体实现签章等工作,都处在系统安全控制之下。
This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.
另一方面是对网络系统实施有效的安全管理,做好网络数据的备份和网络用户的管理两项工作。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
The structure of the system, mail service protocols, mode of messaging, allocation of mailboxes as well as personal security for authentication and access control measures are discussed in this paper.
文中论述了该系统的结构、邮递服务协议、邮递方式、信箱的管理及信件的保密和存取控制手段等问题。
The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.
对于信息系统的安全性一般包括:数据完整性、数据保密性、身份确认和认证、访问控制、不可否认性等几个方面。
Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.
为实现信息系统的安全目标,需要系统能够提供相关的安全服务:身份标识与认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。
There are two aspects included in database system security, which is access control security strategy and communication channel security.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
Based on the characteristics of real estate evaluation system, system security solution from identity authentication, access control and data backup are discussed.
从房地产评估系统的特点出发,从身份认证、访问控制和数据库备份三个角度来考虑评估系统安全问题。
Therefore, the access control becomes one of the essential functions in information security and is to protect the storage and handling of information in enterprise information system.
因此,访问控制成为信息安全必不可少的功能之一,其目的是为了保护企业在信息系统中存储和处理的信息的安全。
To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.
为保护用户数据、系统资源不被非法访问和滥用,现代文件系统设立了文件访问控制、数据加密等各种安全机制。
The system also allows more integration with third-party access control and physical security systems.
该系统还允许有第三方的访问控制和物理安全系统的更多的整合。
This paper takes heading multiple area automatic commerce system (HDPOS5) for example, applied the improved base on position and role access control model to system, ensure the security of the system.
本文以海鼎多业态商业自动化系统(HDPOS5)为例,将改进的基于岗位与角色的访问控制模型应用到该系统中,更好的保证了系统的安全性。
This kind of flexible implementation simplifies the operation of access control and promotes the system security.
该方案简化了访问控制的操作,具有较大的灵活性,使系统的安全性得到提高。
It is easy to control, and easy to explant. Finally, the author uses part of the research result in a project-management Information System for examination to realize the security access control.
最后,在一个以linux为网络服务器,MySQL为网络数据库管理系统的平台上,利用前面研究的部分技术实现对考务管理信息系统的安全控制。
It is easy to control, and easy to explant. Finally, the author uses part of the research result in a project-management Information System for examination to realize the security access control.
最后,在一个以linux为网络服务器,MySQL为网络数据库管理系统的平台上,利用前面研究的部分技术实现对考务管理信息系统的安全控制。
应用推荐