• The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.

    主要介绍网络安全准入控制系统组成相关技术技术铁路信息系统中如何应用加以探讨

    youdao

  • It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.

    务必考虑系统每个层次可能访问路径同时还要考虑授权如何其他安全功能(网络级别保护)集成

    youdao

  • Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.

    可以通过策略实现安全措施(包括部分网络访问)控制服务质量

    youdao

  • For new employees, an average of 73 percent was given security awareness training prior to being granted network access.

    对于员工,有73%机构在其被授予网络访问进行安全意识培训

    youdao

  • In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.

    2中心展示TivoliWebSEAL产品产品充当代理角色提供安全机制控制网络中的文档以及Web对象访问

    youdao

  • It has also installed robust security software on the devices and ensured that they can gain access only to a hospital's network.

    voalte他们的智能手机上安装了强大的安全软件,以确保它们只能通过医院网络连接系统。

    youdao

  • However, the Flash Security model doesn't allow local files to access network resources and vice versa.

    不过FlashSecurity模块允许本地文件访问网络资源反之亦然

    youdao

  • The new architecture is designed to allow a smart card to act as a secure network node, either providing security services to a network or requesting access to network resources.

    架构旨在智能卡成为安全网络结点要么网络提供安全服务要么请求访问网络资源

    youdao

  • Furthermore, code access security eliminates the need for messy dialog boxes asking users whether they trust your network or code downloaded from the Internet.

    此外代码访问安全忽略了弹出询问用户是否信任网络或者英特网上下载的代码的对话需要

    youdao

  • To allow Network Service read and write access to the folder, the security for the folder must be modified.

    为了Net workService能够对文件夹进行访问以及访问,文件夹安全级别必须得到修正。

    youdao

  • Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.

    试图破解网络某一安全防护措施以便在未获得授权情况下访问系统或者是遭到服务拒绝

    youdao

  • Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.

    入网访问控制保证网络资源被非法使用, 是网络安全防范保护主要策略

    youdao

  • Review operational rules: review security practices, patches, and access points to network systems, applications, functions, and data.

    审视运营规则审核安全实践补丁以及网络系统应用功能数据控制访问

    youdao

  • Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.

    网络安全目前信息系统应用重要研究方向如何确定用户身份控制用户对信息资源的访问,是其中的一个重要问题。

    youdao

  • In recent years, with the popularization of the networks, cyber attack and illegal access increased rapidly, it makes the security of network become more grimly.

    随着近年网络普及网络攻击非法访问飞速增长网络安全的形势日益严峻。

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • Perhaps your code needs to cache user Settings or a temporary data file but the default security cannot allow network-deployed code to access the general file system.

    可能代码需要缓存用户设置或者一个临时数据文件但是默认安全性允许网络部署代码访问这个文件系统

    youdao

  • An investigation into February's attack revealed that the cyberthieves won access to the central bank network because of poor security controls.

    二月份孟加拉国央行失窃事件的调查显示由于糟糕安全控制系统,窃贼得以进入央行网络系统

    youdao

  • Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.

    访问控制网络安全一个重要组成部分,保障电子政务信息完整性保密性可用性方面发挥着重要作用。

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • How to guarantee the legal user's legal access to resources and protect hackers' attacks has been the mostly content of network security.

    网络如何保证合法用户资源合法访问以及如何防止网络黑客攻击成为网络安全主要内容

    youdao

  • Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.

    设置用户存取权限控制冗余备份恢复网络安全等多种安全策略共同建立有机的安全体系

    youdao

  • The thesis starts with the introduction of the 3G security architecture, characteristics and aims, and the security mechanism of network access is elaborated at the same time.

    首先介绍3G系统安全体系结构、安全特性、安全目标详细阐述了网络接入安全机制

    youdao

  • The use of the multiple functions of switch in access-control can realize the distribution security system, and implement the security management for the network and the users.

    利用中心交换机多种访问控制功能构建一个分布式网络安全交换体系实现网络用户接入的安全管理

    youdao

  • This method not just protects the first access node (3), but also the following network nodes (10) and users (1) respectively, against a security attack.

    方法不仅保护第一接入节点(3),而且分别保护后面网络节点(10)用户(1),免于安全攻击

    youdao

  • How to provide access control function for CSCD based on P2P network to make the cooperative design more security, it has become a key question studied at present.

    如何基于P 2 P网络协同设计提供合适的访问控制功能使人们可以安全的进行设计活动,已经成为一个急待解决问题

    youdao

  • It analyzes the system security of the Agent, network transmission and resource access.

    系统代理网络传输、资源存取方面安全性进行了分析。

    youdao

  • The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.

    保证网络安全核心策略之一也是信息安全技术的重要组成部分。

    youdao

  • This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.

    一方面网络系统实施有效安全管理,做好网络数据备份网络用户的管理项工作。

    youdao

  • This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.

    一方面网络系统实施有效安全管理,做好网络数据备份网络用户的管理项工作。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定