英语人>网络例句>access control 相关的网络例句
access control相关的网络例句

查询词典 access control

与 access control 相关的网络例句 [注:此内容来源于网络,仅供参考]

It does not depend on the access control technology that requires it.

它不依赖于访问控制技术需要它。

If the destination IP address is local ,the router searches an internal store of IP addresses and local-device Media Access Control addresses. This store is known as the Address Resolution Protocol cache.

如果目的IP地址为本地的,该路由器就搜寻存储着IP地址和本地设备介质访问控制地址的内部存储器,这个存储器叫作地址分辨协议高速缓存。

In addition, access control policies of aggregated resources can be formulated as expressions of the algebra. Several algebraic properties of policy expressions are discussed. It shows that the algebraic properties of policy expressions can be used to verify whether policy composition results meet the protection needs of each party.

用代数表达式形式化地描述聚合资源的访问控制策略,讨论了策略表达式的若干代数性质,说明可借助策略表达式的代数性质去验证策略合成结果是否符合各方对聚合资源的保护性需求。

The users are managed based on roles and grades, the types of users are: anonym, student, teacher and administrator, implement secure management by setting access control privilege specially.

另外,文中叙述了目录服务二次开发的实现过程,采用Netscape Directory JAVA SDK开发包,JSP和JavaBeans技术来开发基于WEB的目录服务客户端,使目录服务中的数据能更方便更安全的被访问和管理。

IEEE 802.1x network access control protocol based on port consists of supplicant, authenticator and authentication sever.

基于端口的IEEE 802.1x访问控制协议由申请者、认证者和认证服务器三部分组成。

Access control is an example of authorization.

访问控制是授权的一个例子。

An authorization and access control model for XML documents is proposed in this paper.

提出了一种XML文档的授权与访问控制模型。

This paper proposes a novel central limit theorem based algorithm to detect medium access control misbehaviors of malicious nodes.

针对无线竞争共享型信道中恶意节点不公平使用信道资源的退避访问攻击行为,提出一种新的中心极限定理检测算法。

An information security assurance system of enterprises is divided into the basic security link, enhancement link and extended security mechanism, which are subdivided into such concrete links as identification and authentication, access control, auditing, fire wall, real-time monitoring and information ciphering.

企业信息安全保障体系分为基本安全环节、增强环节和扩充的安全机制三个层次,其中又细分为身份标识和鉴别、访问控制、审计、防火墙、实时监控、信息加密等具体环节,有些是基本的,有些则并非一定要部署。

Circumvention'.'' of the access control process.

这种错误躲过了存取控制进程。

第12/45页 首页 < ... 8 9 10 11 12 13 14 15 16 ... > 尾页
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。