1) Capabilities Mechanism
Capabilities 访问控制
2) accessing control
访问控制
1.
The article emphasizes on discussing the two measures to protect the datum in the network:accessing control measure and information encryption measure.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
2.
The paper introduces the three kinds of threatens to campus network s safety and resolving methods, especially showing how to use the method of accessing control to safeguard the campus network
介绍了目前校园网面临的3种安全威胁以及应对技术,重点说明了使用访问控制策略保障校园网安全。
3) access control
控制访问
1.
In order to take effective precautions against illegal operation of routers and strengthen the security of computer network, this paper briefly introduces some kinds of the configuration methods of access control ASN routers.
为有效防范非法操作路由器,增强计算机网络的安全性,简要介绍了几种控制访问ASN路由器的配置方法。
4) Access control
访问控制
1.
Application of extended role-based access control under the struts framework;
扩展的角色访问控制模型在Struts结构下的应用
2.
A lattice-based access control model;
一种基于格的访问控制模型
5) interview control
访问控制
1.
This paper discusses the interview control model based on roles firstly,and then brings forward a model of purview assignment based on role and interview control,finally it was realized in police technological investigation managerial system.
访问控制是软件系统安全性重要的组成部分。
6) visit control
访问控制
1.
The paper firstly introduces the actuality and preventing measure of the network security briefly,then presents the establishment of this network security system based on the logistics information platform,which includes visit control, transmit control and server security control etc.
文章简述了网络安全的现状和防范措施 ,结合物流信息平台详细介绍了基于此平台的一整套网络安全体制的建立 ,主要包括访问控制、传输控制和服务器安全控制等 。
2.
This article introduces definition and the management content of the network information management,analyzes the security problem which the network information management involved,researches the safely visit control strategy,and proposes the network information management security skeleton.
本文介绍了网络信息管理的定义及其管理内容,分析了网络信息管理涉及到的安全问题,研究安全访问控制策略,提出了网络信息管理的安全构架。
3.
The visit control safty and information storage safty are illustrated, with the technology backgrounel of Lotus Notes Domino.
以Lotus Notes/Domino实现技术为背景介绍了访问控制安全和信息存储安全的相关技术问题,并根据实践提出了一些实用的解决方案,最后对信息安全控制管理问题提出了见解。
补充资料:反馈控制(见控制系统)
反馈控制(见控制系统)
feedback control
于。。伙。]伙ongZ片}反馈控制(几edbaekcontrol)见拉制系统。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条