查询词典 access control
- 与 access control 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Wavelet Analysis. Prototype IRID systems for access control were developed by Unisys Corporation under a licensing agreement.
小波分析技术早期用于存取控制的 IRID 系统是由 Unisys 公司在获得许可协议后研发的。
-
This paper researches under fund project of nationality natural science (70271045):"The researches on E-government system model and government affair flow reforger". It starts from the proper operation requirement of E-government system, combines the severe challenges of E-government system under current distributing environment, lucubrates the organization and authorization system model of complex government affair information system, presents the flow realization of security access control implementation of E-government system and some noticeable taches.
本文以国家自然科学基金项目(70271045):&电子政务系统模型体系及政务流程再造研究&为研究背景,从电子政务系统特有的业务需求出发,结合当前分布式环境下的电子政务系统面临的严峻挑战,深入研究了复杂政务信息系统的组织与授权体系模型,给出了电子政务系统的安全访问控制实施过程中各个业务过程的流程实现以及需要注意的环节。
-
With secure extension and access control of SOAP messages, web services are of robusticity and their framework is enhanced.
通过对SOAP消息的安全扩充和访问控制处理,提高了Web服务的健壮性,完善了Web服务协议栈的架构。
-
Is mainly used for logistics management, theftproof, access control, automatic bill payments, valuable animal tracking, etc.
主要用于物流管理、防盗、门禁、自动缴费、珍贵动物跟踪等。
-
Currently RFID products international career prospects, such as factory automation, freight transportation, access control, fleet management, waste tracking, theftproof, medical management, retail distribution industry, air bags, library management, management of medical management, apparel, and animal husbandry of track, and so on.
目前RFID的产品应用广范,如工厂自动化、货物运输、门禁管制、车队管理、废弃物追踪、防盗、医疗管理、零售流通业、航空行李、图书管理、医疗管理、服饰管理、以及畜牧业之追踪等等。
-
The main features of this paper is: nothing to do with the platform, this system can be compatible with the majority of software and hardware used by the platform, as well as various database platform, shielding the differences of hardware and software platform such as network, operating systems, databases, application systems and so on, so that enterprises and institutions could achieve seamless, transparent data exchange through data exchange system; Java technology used to develop the system transplantability; using data exchange center to achieve centralized data processing, different data format conversion, increased system scalability; from data transmission, authentication, access control, encryption and more news content log-class areas enhanced data exchange system security; using DES and RSA algorithm , increased the confidentiality of data transmission; create WrapperTimer category achieved data transmission timing implementation and reduce the dependence on artificial.
设计的系统与平台无关,能兼容企业所用的大多数软硬件平台,以及各种数据库平台,屏蔽网络、操作系统、数据库、应用系统等软硬平台的差异,使企事业单位通过数据交换系统实现无缝的、透明的交换数据;采用数据交换中心来实现数据的集中处理、不同数据格式的转换,增加了系统的可扩展性;从数据传输、身份认证、权限控制、消息内容加密和多级日志等多方面增强数据交换系统的安全性;用DES和RSA算法对XML文件或XML文件中的元素进行加密,增加传输数据的保密性;创建WrapperTimer类实现了数据传输的定时执行,降低了对人工的依赖性。
-
Traditional trust negotiation has the insufficiency of credence and privacy preservation of access control strategy, and unsuitably applies in the high security requirement environment.
传统信任协商存在对凭证和访问控制策略的安全防护不足、无法避免策略循环依赖等问题,不适用于安全性要求较高的应用环境。
-
The new release supports IP devices, including the new Software House Wireless Access Control System and C·CURE Mobile, a hand-held wireless device that secures entrances at unwired locations.
新版本支持IP设备,包括SoftwareHouse公司新的无线出入口控制系统和C·CURE移动系统,手持式无线装置提高了无线站点的安全性。
-
In this paper, we put the mathematical model for warless transmitting consumption forward by analyzing nod\'s inner structure, communicational way and coverage on account of impulsions on nod\'s consumption.we discuss and compare some typical Middle Access Control algorithms and protocols in sensor networks, analyze the present problems about power-saving algorithms, protocols and problem been not still dealt, which is all based on considering and analyzing key techniques in energy-saving, such as power-saving in single sensor, data fusion and power-saving algorithms in crossing layers.
在对传感器网络关键节能技术,诸如单节点节能技术、数据融合技术以及垮层节能算法总结的基础上,着重讨论和比较了传感器网络中几类经典的媒体访问控制算法、协议;分析了目前无线传感器网络节能算法、协议和策略亟待解决的问题。
-
In open information system, access control is an important measure that assures the information system security.
在开放式信息系统中,访问控制是保证信息系统安全的一项重要措施。
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力