这篇文章是在访问控制技术。
本论文对工作流系统访问控制技术进行了较深入的研究。
In this paper, many research works have been done on the traditional access control technologies in workflow - management system.
本文在设计上采用访问控制技术,以提高系统的安全性。
In security design, access control is used to enhance the security of the system.
传统的文档保护技术有内容加密技术、访问控制技术等。
These technologies provide some supports of document security and become the mainstream thinking when designing document protection system.
提出了一种基于P2DR的、不可旁路的强制访问控制技术。
A mandatory access control technique is proposed which is based on P2DR and cannot be bypassed.
本论文研究基于角色的访问控制技术及其在法院系统中的应用。
The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.
本论文主要研究和分析了PKI与PMI系统和访问控制技术。
The paper researches the PKI, PMI and access control technology.
基于这一点,外汇市场系统网络安全访问控制技术显得更加重要。
On this point, the technology of network safe access control in the exchange transaction becomes more important.
主流的访问控制技术是从系统整体考虑,提供实施访问控制策略的技术平台。
Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.
作为下一代访问控制技术的使用控制(ucon)模型已经成为访问控制技术研究的热点。
UCON model has become a hot research as the next generation of access control technology.
访问控制技术是网络安全的一项基本技术,主要包括基于角色的访问控制和基于任务的访问控制等技术。
Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.
对基于XML的多源异构数据融合、遥感数据存储、数据持久化以及用户访问控制技术进行了分析和设计;
This paper analyzed critical technology: heterogeneous data fusion based on XML, remote sensing data storage, data persistence and user access control;
随着企业信息系统的广泛使用,系统安全问题受到越来越多的关注,而访问控制技术是解决安全问题的关键。
With the widely using and development of Enterprise Information Systems, people look more important upon the security of system gradually.
文中从实际应用出发,分析了现有的访问控制技术并在此基础上提出一种新的基于信任域的P2 P访问控制模型。
In this paper, analyses the technique of access-control requirements in such environments and proposes a trust domain-based access control framework for P2P environment.
采用基于属性证书的RBAC访问控制技术,可以实施更细粒度的访问控制技术。支持DER和PEM格式的数字证书。
Apply RBAC access control technique based on the attribute certificate to gain finer granularity, all with support to DER and PEM format of digital certificate.
论文首先分析了现有操作系统的访问控制技术,然后在传统访问矩阵模型的基础上,讨论了三维访问矩阵模型,提出了基于程序的访问控制思想。
In this article, we firstly analyze access control technology of current operating system. Then we discuss the three dimension access model, based on traditional access control model.
在对SOAP协议的基本内容和访问控制技术充分讨论的基础之上,对其中关键技术进行了分析,总结出了基于SOAP实现访问控制的若干结论。
Based on sufficient analysis of current SOAP protocol and access control, to analyse the key technology, and draw conclusion on the access control based on SOAP.
电影以及唱片行业、在线音乐商店以及电子书籍出版商都会使用其特定的DRM技术来控制对其数据的访问。
The movie and recording industry, online music stores, and electronic book publishers all use their own specific DRM technology to control access to their data.
其上部是包含访问、审核和加密控制的中间层,然后是技术所在的最外层。
On top of it are the middle layer of access, audit, and cryptographic controls and then the outermost layer of technologies.
可以使用中间件技术对服务进行组合,并对服务中的特定功能进行访问控制。
Middleware technology is available to orchestrate services and control access to specific functionalities in the service.
解释以太网技术和介质访问控制方法
Explain the technology and media access control method for Ethernet networks
选项2:从技术的角度而言,人工活动需要的用户界面应与其他消费应用程序(consuming application)一样受到相同的访问控制机制和其他功能的限制。
Option 2: From a technical point of view, human activities require a user interface that is subject to the same access control mechanisms and other capabilities as other consuming applications.
在审计术语中,控制没有技术上的标准,而只是一些过程,通过它们可以访问标准,并在一定周期的基础上进行审阅。
In auditing lingo, controls are not technological measures, but are the processes by which technological measures are assessed and reviewed on a periodic basis.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
工作流技术广泛应用于电子政务系统中,但工作流系统中的访问控制问题却没有引起足够重视和得到有效解决。
Workflow technology is widely applied in e-government systems, but the access control problems in workflow system are still not received enough recognitions and not effectively resolved.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
分布式数据库安全的核心技术是用户身份验证和访问控制。
The essential security technologies of the distributed database are user authentication and access control.
而利用访问权限的控制,则让面向对象技术更完整地实现信息隐藏的概念。
Is it visit control of authority to utilize, is it face target technology realize information hidden concept completely to let.
而利用访问权限的控制,则让面向对象技术更完整地实现信息隐藏的概念。
Is it visit control of authority to utilize, is it face target technology realize information hidden concept completely to let.
应用推荐