英语人>网络例句>access 相关的网络例句
access相关的网络例句

查询词典 access

与 access 相关的网络例句 [注:此内容来源于网络,仅供参考]

Lead lanthanum zirconate titanate exhibits many desirable optical and electrical properties such as ferroelectricity.dielectrics and holds great promise for wide applications in ferroelectric random access memory and dynamic random access memory.

锆钛酸铅镧具有良好的铁电介电和光学性能,在铁电存储器、动态随机存储器等方面应用前景广阔。

The invention adds function of user management to base station in wireless access system so as to realize administrable, operational wireless access network in broadband.

本发明在无线接入系统的基站上增设有用户管理的功能,可以实现宽带无线接入网络的可管理、可运营;另外,可以对接入用户进行安全检查,防止非法用户攻击。

Athabasca University, Canada's Open University is committed to the elimination of barriers to restrict access to and success at university level research and to increase equal access to education, adult learners around the world.

阿萨巴斯卡大学,加拿大的开放大学,是致力于消除障碍,限制进入和成功大学一级的研究和增加享有平等的受教育的机会,世界各地的成人学习者。

Men and boys must be mobilized in promoting equal access to and enjoyment of: the right to inheritance and property ownership; universal access to reproductive health services and commodities; employment, educational and vocational training opportunities; gender equitable parenting and caretaking; the right to participate in public and cultural life, just to name a few.

我们必须动员男性参与推动继承权和财产权的平等享有,生殖健康服务和用品的普遍享有,就业、教育、职业培训的公平机会,抚养和照顾儿童的平等义务,参与公共和文化生活的共同权利,等等。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

Carrier s ense multiple access collision detect describes the Ethernet access method.

载波侦听多路访问冲突检测机制描述了以太网的访问方式。

The production indicate that the research find out distributing, range, size, geological environment, formative reason and genesic facter of YuQiuHao landslides. At the same time, I calculate and access stability of landslide, put forward scheme of prevention, access economic benefit, finally achieve anticipateve purpose.

论文就是在GIS技术的基础上,查明勘查区自然条件及地质环境条件、滑坡基本特征及类别,在此基础上进行稳定性分析评价,分析其成灾的可能性,成灾的条件,分析论证防治的必要性和可行性,进行工程治理与搬迁避让的比较,提出工程防治方案的建议,为可行性研究提供必要的地质资料。

Secondly, impenetrate into researching the most important part of access control of EIP. RBAC uses roles to be assigned, make the management, control of the access control simpler.

然后,对企业信息门户最重要的访问权限控制部分进行深入研究,采用基于角色的权限控制的解决方案。

The article improved and expanded the threshold access control model based on quantified permissions, solved the problems of access control system deduced by introducing permission quantity into permission concept, such as huge quantity of permissions and vales, heavy administration load, and inadequation to deal with the dynamic quantity evolution.

对基于量化权限的门限访问控制方案进行了改进与扩展,解决了权限概念引入权限量后导致的访问控制系统权限及角色数量巨大、管理负荷沉重以及不适应权限量动态演化的问题。

The supporting technologies of network information security are summarized. The unitive authentication systems existing are analyzed in this paper; their virtues and shortcomings are discussed.2. About the distributed peculiarities of allied resource, the concept of alliance grid is established. The access control model of alliance grid is established by directive ideas of access control security of alliance grid. AG-RBAC model is set up in the basic of common RBAC, interbedded relations between roles are set forth.

针对制造联盟企业资源分布式的特点,提出了联盟网格的概念;根据联盟网格安全访问控制的指导思想,提出了联盟网格访问控制模型;在一般RBAC模型的基础上提出了基于角色的联盟网格访问控制模型,清晰的表述了角色之间的层次关系;初步分析了AG-RBAC的实现模式,重点讨论了角色定义和权限配置的实现方法。

第19/500页 首页 < ... 15 16 17 18 19 20 21 22 23 ... > 尾页
相关中文对照歌词
Big Sunglasses
Access Me
Access Babylon
Stand By Your Beds
NPG Operator
Eine Tasse Tee
Federal Funding
Flamboastin'
Resign To Surrender - A New Age Dawns - Pt. IV
Thinkin' Man's Nightmare
推荐网络例句

Article 144 The Government of the Hong Kong Special Administrative Region shall maintain the policy previously practised in Hong Kong in respect of subventions for non-governmental organizations in fields such as education, medicine and health, culture, art, recreation, sports, social welfare and social

第一百四十四条香港特别行政区政府保持原在香港实行的对教育、医疗卫生、文化、艺术、康乐、体育、社会福利、社会工作等方面的民间团体机构的资助政策。原在香港各资助机构任职的人员均可根据原有制度继续受聘。

Small wonder, then, that the Chinese spend more in the shop than any other group of foreign visitors do .

这样的小惊喜,使中国顾客比任何国家的人消费得更多。

A heavy dark cloud presaging rain or a storm .

预兆雨或暴风雨的沉重的黑云。