• 篇文章访问控制技术

    This article is on an access control technology for.

    youdao

  • 论文对工作流系统访问控制技术进行了较深入的研究

    In this paper, many research works have been done on the traditional access control technologies in workflow - management system.

    youdao

  • 本文设计采用访问控制技术提高系统安全性

    In security design, access control is used to enhance the security of the system.

    youdao

  • 传统文档保护技术内容加密技术访问控制技术等。

    These technologies provide some supports of document security and become the mainstream thinking when designing document protection system.

    youdao

  • 提出基于P2DR的、不可旁路强制访问控制技术

    A mandatory access control technique is proposed which is based on P2DR and cannot be bypassed.

    youdao

  • 论文研究基于角色访问控制技术及其法院系统中的应用

    The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.

    youdao

  • 论文主要研究和分析PKIPMI系统访问控制技术

    The paper researches the PKI, PMI and access control technology.

    youdao

  • 基于一点外汇市场系统网络安全访问控制技术显得更加重要

    On this point, the technology of network safe access control in the exchange transaction becomes more important.

    youdao

  • 主流访问控制技术是从系统整体考虑,提供实施访问控制策略技术平台

    Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.

    youdao

  • 作为下一代访问控制技术使用控制(ucon)模型已经成为访问控制技术研究热点

    UCON model has become a hot research as the next generation of access control technology.

    youdao

  • 访问控制技术网络安全一项基本技术主要包括基于角色访问控制和基于任务的访问控制技术

    Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.

    youdao

  • 基于XML多源异构数据融合遥感数据存储、数据持久化以及用户访问控制技术进行了分析和设计

    This paper analyzed critical technology: heterogeneous data fusion based on XML, remote sensing data storage, data persistence and user access control;

    youdao

  • 随着企业信息系统广泛使用,系统安全问题受到越来越多关注,而访问控制技术是解决安全问题的关键

    With the widely using and development of Enterprise Information Systems, people look more important upon the security of system gradually.

    youdao

  • 文中从实际应用出发,分析了现有访问控制技术基础上提出一种新的基于信任的P2 P访问控制模型

    In this paper, analyses the technique of access-control requirements in such environments and proposes a trust domain-based access control framework for P2P environment.

    youdao

  • 采用基于属性证书RBAC访问控制技术,可以实施更细粒度访问控制技术支持DERPEM格式数字证书。

    Apply RBAC access control technique based on the attribute certificate to gain finer granularity, all with support to DER and PEM format of digital certificate.

    youdao

  • 论文首先分析了现有操作系统访问控制技术然后传统访问矩阵模型的基础上,讨论访问矩阵模型,提出了基于程序的访问控制思想。

    In this article, we firstly analyze access control technology of current operating system. Then we discuss the three dimension access model, based on traditional access control model.

    youdao

  • SOAP协议基本内容访问控制技术充分讨论的基础之上,对其中关键技术进行了分析总结出了基于SOAP实现访问控制的若干结论

    Based on sufficient analysis of current SOAP protocol and access control, to analyse the key technology, and draw conclusion on the access control based on SOAP.

    youdao

  • 电影以及唱片行业在线音乐商店以及电子书籍出版商都会使用特定DRM技术控制数据访问

    The movie and recording industry, online music stores, and electronic book publishers all use their own specific DRM technology to control access to their data.

    youdao

  • 上部包含访问审核加密控制中间层,然后技术所在外层。

    On top of it are the middle layer of access, audit, and cryptographic controls and then the outermost layer of technologies.

    youdao

  • 可以使用中间件技术服务进行组合,服务中的特定功能进行访问控制

    Middleware technology is available to orchestrate services and control access to specific functionalities in the service.

    youdao

  • 解释以太网技术介质访问控制方法

    Explain the technology and media access control method for Ethernet networks

    youdao

  • 选项2技术角度而言,人工活动需要用户界面应与其他消费应用程序(consuming application)一样受到相同的访问控制机制其他功能的限制。

    Option 2: From a technical point of view, human activities require a user interface that is subject to the same access control mechanisms and other capabilities as other consuming applications.

    youdao

  • 审计术语中控制没有技术上的标准只是一些过程通过它们可以访问标准,一定周期的基础上进行审阅。

    In auditing lingo, controls are not technological measures, but are the processes by which technological measures are assessed and reviewed on a periodic basis.

    youdao

  • 有关更多信息请参见如何添加移除访问控制列表ACL技术概述

    For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.

    youdao

  • 工作流技术广泛应用电子政务系统中,工作流系统中的访问控制问题没有引起足够重视得到有效解决

    Workflow technology is widely applied in e-government systems, but the access control problems in workflow system are still not received enough recognitions and not effectively resolved.

    youdao

  • 访问控制模型技术研究工作流系统安全机制核心,也是信息安全领域的一个热点问题。

    The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.

    youdao

  • 分布式数据库安全核心技术用户身份验证访问控制

    The essential security technologies of the distributed database are user authentication and access control.

    youdao

  • 利用访问权限控制面向对象技术完整实现信息隐藏概念

    Is it visit control of authority to utilize, is it face target technology realize information hidden concept completely to let.

    youdao

  • 利用访问权限控制面向对象技术完整实现信息隐藏概念

    Is it visit control of authority to utilize, is it face target technology realize information hidden concept completely to let.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定