The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
For new employees, an average of 73 percent was given security awareness training prior to being granted network access.
对于新员工,有73%的机构在其被授予网络访问前进行安全意识培训。
In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.
图2的中心展示的是Tivoli的WebSEAL产品,该产品充当代理的角色并提供安全机制来控制对网络中的文档以及Web对象的访问。
It has also installed robust security software on the devices and ensured that they can gain access only to a hospital's network.
voalte还在他们的智能手机上安装了强大的安全软件,以确保它们只能通过医院的网络连接系统。
However, the Flash Security model doesn't allow local files to access network resources and vice versa.
不过,FlashSecurity模块不允许本地文件访问网络资源,反之亦然。
The new architecture is designed to allow a smart card to act as a secure network node, either providing security services to a network or requesting access to network resources.
新架构旨在让智能卡成为安全的网络结点,要么为网络提供安全服务,要么请求访问网络资源。
Furthermore, code access security eliminates the need for messy dialog boxes asking users whether they trust your network or code downloaded from the Internet.
此外代码访问安全忽略了弹出询问用户是否信任您的网络或者从英特网上下载的代码的对话框的需要。
To allow Network Service read and write access to the folder, the security for the folder must be modified.
为了让Net workService能够对文件夹进行读访问以及写访问,文件夹的安全级别必须得到修正。
Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.
试图破解网络上某一处的安全防护措施,以便在未获得授权的情况下访问系统或者是遭到服务拒绝。
Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
Review operational rules: review security practices, patches, and access points to network systems, applications, functions, and data.
审视运营规则:审核安全实践、补丁,以及到网络系统、应用、功能和数据的控制访问点。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
In recent years, with the popularization of the networks, cyber attack and illegal access increased rapidly, it makes the security of network become more grimly.
随着近年来网络的普及,网络攻击和非法访问飞速增长,网络安全的形势日益严峻。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
Perhaps your code needs to cache user Settings or a temporary data file but the default security cannot allow network-deployed code to access the general file system.
可能您的代码需要缓存用户的设置或者一个临时数据文件,但是默认的安全性与允许网络部署代码访问这个文件系统。
An investigation into February's attack revealed that the cyberthieves won access to the central bank network because of poor security controls.
对二月份孟加拉国央行失窃事件的调查显示,由于糟糕的安全控制系统,窃贼才得以进入央行网络系统。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.
访问控制策略是网络安全策略的重要组成部分,基于角色访问控制策略以其方便有效的特点日益受到人们的关注。
How to guarantee the legal user's legal access to resources and protect hackers' attacks has been the mostly content of network security.
在网络上如何保证合法用户对资源的合法访问以及如何防止网络黑客攻击,成为网络安全的主要内容。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
The thesis starts with the introduction of the 3G security architecture, characteristics and aims, and the security mechanism of network access is elaborated at the same time.
首先介绍了3G系统的安全体系结构、安全特性、安全目标,并详细阐述了网络接入安全机制。
The use of the multiple functions of switch in access-control can realize the distribution security system, and implement the security management for the network and the users.
利用中心交换机的多种访问控制功能,可构建一个分布式的网络安全交换体系,以实现对网络和用户接入的安全管理。
This method not just protects the first access node (3), but also the following network nodes (10) and users (1) respectively, against a security attack.
此方法不仅保护第一接入节点(3),而且分别保护后面的网络节点(10)和用户(1),免于安全攻击。
How to provide access control function for CSCD based on P2P network to make the cooperative design more security, it has become a key question studied at present.
如何给基于P 2 P网络的协同设计提供合适的访问控制功能,使人们可以更安全的进行设计活动,已经成为一个急待解决的问题。
It analyzes the system security of the Agent, network transmission and resource access.
对系统在代理、网络传输、资源存取方面的安全性进行了分析。
The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.
它是保证网络安全的核心策略之一,也是信息安全技术的重要组成部分。
This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.
另一方面是对网络系统实施有效的安全管理,做好网络数据的备份和网络用户的管理两项工作。
This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.
另一方面是对网络系统实施有效的安全管理,做好网络数据的备份和网络用户的管理两项工作。
应用推荐