英语人>网络例句>access control 相关的网络例句
access control相关的网络例句

查询词典 access control

与 access control 相关的网络例句 [注:此内容来源于网络,仅供参考]

Role based access control is one kind of access control technologies which has been developed in the recent years.

基于角色的访问控制是近年来发展起来的一种访问控制技术,可降低访问控制的复杂度。

Access control model is the foundation of the realization of access control in the system.

访问控制模型是访问控制实现的基础。

In this paper, the heterogeneity of resource is not discussed and the topic is on the focus of the access control issue in sharing mechanism. The system of information grid consists of heterogeneous administrative domain in which the access control mechanism and security policy are not uniform.

信息网格是一个由访问控制机制和安全策略不同的异构管理域组成的环境,不同的域可能有不同的访问控制目标和要求。

Development, in the traditional access control based on the added attendance and surveillance technology, access control, attendance, and the whole monitoring system together, to reach more than one machine with the effect of real intelligence and security··in one system, even in the traditional analog monitor based on the combination of computer digital video and network communication technologies, has introduced an international leader in the digital real-time monitoring of products and through their own efforts with partners to create the cause of our nation's security.

发展,在传统门禁基础上增添考勤和监控技术,将门禁、考勤、监控系统整和到一起,使其达到一机多用的效果,真正实现智能与安全方范于一体的系统,更在传统模拟监控基础上、结合计算机数字视频及网络通讯技术,不断推出具有国际领先的数字化实时监控产品,并通过自身努力与合作伙伴共同缔造我们中华民族的安防事业。

Based on the distributed peculiarities of DFP and guiding principles of the access control security of DFP, the access control model of DFP was established.

根据角色的网络资源访问控制的理论,以及统一身份认证的体系结构和功能模型实现了本文的原型系统。

Discretionary Access Control policy is an access control based on ownership relations between subject and object. The subject can discretionarily decide that who, by which means, can access his owned objects.

自主访问控制政策是基于客体—主体的所属关系的访问控制,主体可自主地决定其他的哪些主体可以以何种方式来访问他拥有的客体。

Secondly, impenetrate into researching the most important part of access control of EIP. RBAC uses roles to be assigned, make the management, control of the access control simpler.

然后,对企业信息门户最重要的访问权限控制部分进行深入研究,采用基于角色的权限控制的解决方案。

Introducing the idea of fuzzy logic, this paper advances Trust-authorization-based fuzzy access control model and exerts fuzzy synthetic judgment method to calculate subjects' trust worthiness, establishes fuzzy control rules, automatically authorizes subjects' relevant privilege by fuzzy adjudging, which can satisfy requirements of open information system access control.

文中引入模糊逻辑的思想,提出了基于信任授权的模糊访问控制模型,运用模糊综合评判法计算出主体在开放式信息系统中的信任度,并建立模糊控制规则,通过模糊判决自动授予主体相应的权限,使其能够更好的满足开放式信息系统中访问控制的要求。

To overcome the shortcoming of the double-way authentication access control scheme based on Harns digital signature, a new double-way authentication protocol is proposed to improve the old one. A new single-key-lock-pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital.

针对基于Harn数字签名双向认证访问控制实现方案中所存在的问题,运用密码技术改进了原方案的双向认证协议,并作为对原访问控制方案的改进,基于整数二进制表示的唯一性,提出了一种新的单钥-锁对访问控制方案。

The invention discloses an access control table and safety policy database method in data communication field, including: 1, initializing a Radix tree of access control table or safety policy database; 2, constructing clauses and subclauses of a rule; 3, inserting the rule in the Radix tree; 4, repeating the steps 2 and 3, in order to insert all the rules in the Radix tree, and forming the complete access control table or safety policy database; 5, searching matching rules.

本发明公开了一种数据通讯领域中访问控制列表和安全策略数据库的方法,包括:1。对访问控制列表或安全策略数据库的Radix树进行初始化;2。构造规则条目;3。将规则插入Radix树;4。重复第二步和第三步,将所有规则插入到Radix树中,形成整个访问控制列表或安全策略数据库;5。查询匹配的规则。

第2/45页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

But we don't care about Battlegrounds.

但我们并不在乎沙场中的显露。

Ah! don't mention it, the butcher's shop is a horror.

啊!不用提了。提到肉,真是糟透了。

Tristan, I have nowhere to send this letter and no reason to believe you wish to receive it.

Tristan ,我不知道把这信寄到哪里,也不知道你是否想收到它。