英语人>网络例句>access control 相关的网络例句
access control相关的网络例句

查询词典 access control

与 access control 相关的网络例句 [注:此内容来源于网络,仅供参考]

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

YOU AGREE THAT PAYCENTER.COM.CN WILL NOT BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY LOSS THAT MAY OCCUR DUE TO ANY LOSS OF REGISTRATION OF A DOMAIN NAME, THE USE OF YOUR DOMAIN NAME, ACCESS DELAYS OF ACCESS INTERRUPTIONS TO PAYCENTER.COM.CN'S REGISTRATION SYSTEM; THE NON-DELIVERY OR MISDELIVERY OF DATA BETWEEN YOU AND PAYCENTER.COM.CN; EVENTS BEYOND PAYCENTER.COM.CN'S REASONABLE CONTROL; THE PROCESSING OF THIS APPLICATION; THE PROCESSING OF ANY MODIFICATION TO THE RECORD ASSOCIATED WITH YOUR DOMAIN NAME, THE FAILURE OF YOU OR YOUR AGENT TO PAY ANY FEES HEREUNDER; OR THE APPLICATION OF THE DISPUTE POLICY.

你方同意www.lailailai.com 将不会对你方或任何其他个人的任何损失负责,损失的发生可能由于任何域名注册的遗失,你方域名的使用,对www.lailailai.com 的注册系统访问中断引起的访问延迟;你方和www.lailailai.com 之间无法投送的或是错误投送的数据; www.lailailai.com 无法合理控制的事件;处理本申请;处理与你方域名相关纪录的任何修改;你方或你方的代理没有支付任何下述的费用;或争议政策的运用。

You agree that, to the fullest extent permitted by applicable law, we will not be responsible or liable (whether in contract, tort, or otherwise), under any circumstances, for any interruption of business; access delays or access interruptions to the site; data non-delivery, misdelivery, corruption, destruction or other modification; loss or damages of any sort incurred as a result of dealings with or the presence of off-web site links on the site; computer viruses, system failures or malfunctions which may occur in connection with your use of the site, including during hyperlink to or from third party web sites any inaccuracies or omissions in content or events beyond our reasonable control.

您同意,在法律允许的最大范围内,在任何情况下,我们都不会对以下事项承担责任或义务﹕业务受干扰;使用本网站时出现延误或中断;数据未送达、错误送达、损坏、毁损或其他变更;由於处理本网站上与本网站外部的链接或该等链接的存在造成的任何种类的损失或损害;在您使用本网站时(包括通过超文本链接从本网站进入第三方网站或从第三方网站进入本网站时)产生的电脑病毒、系统失灵或故障;或超出我们合理控制范围以外的事件。

Access Control Service provides capabilities for controlling user access to Web applications and services by federating with multiple standards-based identity providers.

访问控制服务通过与多种基于标准的identity供应方合作而提供了控制用户访问网络应用及服务的能力。

That's a good start. Remote access gateways have included network access control for ages.

我们已经有了一个很好的开始,远程接入网关能够长时间的对网络进行接入控制。

Allows the use of common OO access modifiers to control access to methods and properties.

允许使用公共的面向对象访问权限修饰来控制方法和属性的使用权限。

Gauges access control system, its general as the main contact devices to electrical use, the use of instruments should pay attention to access the load power, voltage and current shall not exceed their ratings.

仪表接入控制系统时,其接点装置一般作为主令电气使用,使用时应注意接入仪表的负载功率,电压及电流均不得超过其额定值。

So some key issues of access control and trust management in grid environments are researched in this thesis and our work mainly include: The traditional security mechanisms are mainly concerned about the security of the provider of resources and miss the protection of the access requesters.

为解决网格环境的动态性和不确定性带来的安全问题,对网格环境下的访问控制和信任模型进行深入研究,既具有理论意义亦具有实用价值,研究内容主要包括:传统的访问控制方法仅仅对资源提供方提供了保护,没有考虑访问主体的安全。

In yet another embodiment, an access point transmits a beacon or an association message including a capability information element that indicates operation or support for a legacy preamble, HT STA preambles and a medium access control packet transmission with HT protection mechanisms.

在又一个实施方式中,接入点发射包括性能信息元素的信标或相关报文,所述信标或相关报文指示对于传统前置码、HT STA前置码以及具有HT保护机制的媒体接入控制分组传输的运行或支持。

When receiving the pseudo acknowledge signal via the memory access control unit, the CPU switches the memory access method for the external processing unit to the fixed waiting mode.

CPU(10),当通过存储访问控制装置(11)接受拟似确认信号时,将与外部处理单元的存储访问方式切换到固定等待模式。

第18/500页 首页 < ... 14 15 16 17 18 19 20 21 22 ... > 尾页
相关中文对照歌词
Lose Control
Control
Loss Of Control
Takin' Control
Let The Beat Control Your Body
P Control (Remix)
Control
Take Control
Out Of Control
Out Of Control (Sasha Remix)
推荐网络例句

In the days of sailing vessels the crew were afraid they would be becalmed on the ocean.

在使用帆船的时代,船员们担心他们会因为无风而无法在海洋上航行。

As long as foreign donors pay the PA's salary bill, few expect a new intifada.

只要外国继续为巴权力机构的薪水买单,希望发动新暴动的人便寥寥无几。

Speak with contempt of none,form slave to king,the meanest bee,and will use,a sting.

别用 言词贬低任何人,无论国王还是奴隶。最卑戝的蜜蜂也会用它的毒针蜇人。