• Based on the access control model, we proposed a remote access control scheme for resources using digital watermarking.

    现有的访问控制系统模型基础上,提出一个使用数字水印进行资源远程访问控制的方案

    youdao

  • This paper proposes a authentication and access control scheme which USES modified threshold DSA algorithm in P2P network.

    P 2 P网络应用门限DSA算法提出一种适应网络动态性强等特点的节点认证访问控制方案

    youdao

  • Based on compound problem, this paper proposed an authentication-doubled access control scheme for information protection system.

    本文基于复合问题针对信息保密系统提出了一种双重认证的存取控制方案

    youdao

  • Based on a one-way function, this paper proposed an authentication-doubled access control scheme for information protection system.

    本文基于单向函数针对信息保密系统提出了一种双重认证的存取控制方案

    youdao

  • This paper presents a multi-group access control scheme that achieves multi-privileged access by combining the centralized and distributed key management scheme.

    该文提出了一种多重组的访问控制方案,该方案使用集中式分布协同式结合的密钥更新算法实现了多权限的控制。

    youdao

  • We analyze RBAC concept model, compare it with traditional access control scheme, and demonstrate the necessity of implement RBAC in Enterprise Information Systems.

    本文从理论上研究了RBAC概念模型,并传统安全访问控制相比较论证企业信息系统中采用RBAC的必要性

    youdao

  • In this paper, we present an access control scheme that can resolve these issues, and propose a dynamic context-aware access control model (DCAAC) which extends RBAC with context constraints.

    本文提出了一个上下文感知访问控制模型(DCAAC),D CAAC扩展了RBAC模型,增加了上下文约束

    youdao

  • In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.

    用户层次结构动态存取控制问题上,本文提出一种安全有效方案

    youdao

  • At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.

    最后方案设计基础实现认证访问控制系统结合RADIUS认证服务器构建实验系统平台

    youdao

  • This resolving scheme is based on advanced J2EE platform, applies MVC pattern, Session Facade pattern and Data Access Object pattern to control E-mail from two directions of sending and receiving.

    解决方案架构先进J2EE平台之上应用MVC模式会话模式数据访问对象模式等J2EE开发模式,两个方向电子邮件进行了有效控制

    youdao

  • The anonymity of blind signature scheme can be applied to the field of e-commerce, e-voting and anonymous access control and etc.

    签名匿名性应用电子商务电子投票匿名存取控制等领域

    youdao

  • Firstly, this paper analyzes the characteristic of access control of application, and the characteristic of application, brings forward the collectivity scheme of access control of application.

    论文首先分析了应用系统访问控制特征应用系统特点提出了应用系统访问控制的总体方案

    youdao

  • The scheme is based on the user access control and it defines a fine access control mode. It is very suitable for the case that need to authenticate the user of the private network.

    方案用户认证基于用户权限进行的,定义良好的资源访问控制模式非常适合实际系统对内部网络用户有认证要求的场合。

    youdao

  • To protect information from the ignorant, and the vile. an elaborate scheme of permissions is used. Permissions, also known as access control, are what determine who can do what to what.

    为了避免信息受到无知者恶意者干扰,使用一种精心设计许可”,叫“存取控制”,决定可以什么什么。

    youdao

  • To protect information from the ignorant, and the vile. an elaborate scheme of permissions is used. Permissions, also known as access control, are what determine who can do what to what.

    为了避免信息受到无知者恶意者干扰,使用一种精心设计许可”,叫“存取控制”,决定可以什么什么。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定