resource access security

英 [rɪˈsɔːs ˈækses sɪˈkjʊərəti] 美 [ˈriːsɔːrs ˈækses sɪˈkjʊrəti]

资源访问安全(性),资源接达安全

计算机



双语例句

  1. By constructing VPN network, we can fully utilize the bandwidth resource of Internet, and realize remote access and maintenance to intranet with more of flexibility, security and economy.
    通过构建VPN网络,可以利用公共互联网资源,实现远程灵活、安全的接入局域网系统,显著提高了远程维护工作的效率。
  2. The experimental results show that the identity authentication which integrated iris identify with the secret key encryption technique can effectively control the resource access on WWW in security and can effectively reduce the probability which being attacked.
    实际测试的结果表明,虹膜识别与网页结合的身份认证,能够达到控制网站上资源存取的目的,较大程度地减小了攻击者破解的可能性。
  3. Resource Access Model Based Security Improvement
    基于程序资源访问建模的安全增强
  4. Based on the research of request/ response model of HTTP protocol, session tracking and processing technology is used to implement access only to authorized users, and policy of resource access control and form-based authentication are combined to implement the security manager module in the system.
    系统通过对HTTP请求/响应模刑的研究,采用会话跟踪和处理来实现授权访问,并采用资源访问控制和基于表单的认证相结合的方式实现系统管理模块的安全性。
  5. This article introduces the status quo, significance and the problems lied in the access to public security information resource in China, and puts forward some countermeasures to promote the access to public security information resource in our country.
    介绍我国证券信息资源公共获取的现状、意义、存在的问题及促进我国信息资源公共获取应采取的对策。
  6. This paper introduce the design and implementation of the EVP resource space model-based authorization and access control mechanism, and take a measurement and analysis to the performance penalty due to the use of security mechanism.
    本文介绍了基于EVP资源空间模型和EVP主体空间模型构建的织女星网格操作系统的授权与访问控制机制的设计和实现,并对由于使用安全机制引起的性能损失进行了测试和分析。
  7. Topics which have been studied include research of the chaos resource, chaotic modulation for transmission of information, chaotic spreading codes for multi-user access in spreading spectrum system, chaotic encryption for security.
    混沌通信研究的课题包括混沌源研究、混沌调制技术、扩频多址系统的混沌扩频码和混沌加密技术等。
  8. When we share the information and access the resource, we must consider the security of the system that we access. Access control is a security service mechanism, which constraint the action to the resource to insulate the sensitivity information.
    在进行信息共享和资源访问的同时,必须兼顾到系统的安全性,而访问控制正是一种通过约束用户访问行为而达到对敏感信息进行隔离目的的安全服务机制。
  9. Furthermore, we design a security model in Web database system; develop a resource management system which is based on RBAC model. In this management system, we apply identity validation module and access control module to ensure the security of the whole Web database system.
    此外,文章的最后设计了Web数据库的安全模型,并且开发了一个基于RBAC模型的物资管理系统,实现了身份验证和访问控制模块,保障了整个Web数据库系统的安全。
  10. Permissions module is used to deal with resource management using access control problem, and with its control of user access to these resources the security of the system have been enhancing.
    权限子模块是用来处理资源管理的使用权限控制问题,有了权限管理模块才能控制用户对各种资源的访问,从而增强了系统的安全性。
  11. Especially in the information security and the bottom of the pyramid construction of the building of a lack of security based on the Resource Access Control management, enterprise information security infrastructure of the major hidden dangers.
    尤其是在信息安全建设金字塔底层的基础安全建设中缺乏集中的资源访问控制管理,使企业的信息安全基础存在重大的隐患。
  12. For intelligence information resource for information security to the special requirements of the user based on security rights of full-text search methods, effective control user access retrieval system security permissions.
    针对该单位信息情报资源对于信息安全的特殊要求,提出了基于用户安全权限的全文检索方式,有效控制用户访问检索系统的安全权限。