This article is on an access control technology for.
这篇文章是在访问控制技术。
The paper researches the PKI, PMI and access control technology.
本论文主要研究和分析了PKI与PMI系统和访问控制技术。
Trusted IP equipment proposed access control technology is proposed in this paper.
提出了IP设备可信接入控制技术。
UCON model has become a hot research as the next generation of access control technology.
作为下一代访问控制技术的使用控制(ucon)模型已经成为访问控制技术研究的热点。
Based on this provisional authorization model, several problems of XML access control technology are discussed in detail.
在此临时授权模型基础之上,我们详细讨论了XML访问控制的若干技术问题。
Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.
主流的访问控制技术是从系统整体考虑,提供实施访问控制策略的技术平台。
The computer access control technology as a very important part of information assurance area has been researched widely and thoroughly.
计算机访问控制是信息安全领域中的一项重要技术,正在展开深入、广泛的研究与应用。
Access control technology is an important research project, it is very significant for guarantee the integrality and authentication of information.
存取控制技术的研究是信息安全领域一项重要的研究课题,它的研究对于保证信息的完整性和认证性有着重要的意义。
The object of wireless media access control technology is to improve the system throughput, ensure fairness and reliability and reduce access delay.
无线媒体接入控制技术,以提高系统吞吐率、保证公平性和可靠性、降低接入时延为主要目标。
Radio frequency identification (RFID) technology and biometric feature recognition technology have become the mainstream of modern access control technology now.
射频识别(RFID)技术与生物特征识别技术如今已经成为当代门禁技术的主流。
The medium access control Technology focuses on multi-address access, that is, how to coordinate users sharing a common channel to achieve efficient and reliable transmission.
媒体接入控制技术的核心问题是如何协调多个用户共用一个信道实现高效可靠传输,即多址接入问题。
In this article, we firstly analyze access control technology of current operating system. Then we discuss the three dimension access model, based on traditional access control model.
论文首先分析了现有操作系统的访问控制技术,然后在传统访问矩阵模型的基础上,讨论了三维访问矩阵模型,提出了基于程序的访问控制思想。
Parents can make use of programs that control access to the Internet, but adolescents in this age group are quite savvy about technology and the Internet.
父母可以利用程序控制孩子使用电脑,但是这个年龄阶段的青少年对技术和互联网非常精通。
The movie and recording industry, online music stores, and electronic book publishers all use their own specific DRM technology to control access to their data.
电影以及唱片行业、在线音乐商店以及电子书籍出版商都会使用其特定的DRM技术来控制对其数据的访问。
Middleware technology is available to orchestrate services and control access to specific functionalities in the service.
可以使用中间件技术对服务进行组合,并对服务中的特定功能进行访问控制。
Explain the technology and media access control method for Ethernet networks
解释以太网技术和介质访问控制方法
For the first time in TB control, we are enabling access to state-of-the-art technology simultaneously in low, middle and high income countries.
在结核病控制方面,我们使低、中、高收入国家同时获得最先进的技术尚属首次。
Access to science and technology empowers women to take control of their health and enables women and girls to participate in specialized training and educational programmes.
获得科学技术使妇女掌控自身健康,也使妇女和女童参加到专门的培训和教育规划之中。
Workflow technology is widely applied in e-government systems, but the access control problems in workflow system are still not received enough recognitions and not effectively resolved.
工作流技术广泛应用于电子政务系统中,但工作流系统中的访问控制问题却没有引起足够重视和得到有效解决。
In this paper, an Area Access Control System based on RFID technology has been introduced.
本文介绍了一种基于RFID技术的小区门禁系统。
Medium Access Control (MAC) protocol is the key technology in wireless ATM systems.
媒介接入控制(mac)层协议是无线atm的一项关键技术。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.
本论文研究基于角色的访问控制技术及其在法院系统中的应用。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
Access control is the central technology of the security of database.
访问控制是实现数据库安全的核心技术。
It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.
本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制。
Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path (DCP) searching algorithm based on binary tree.
基于SPKI技术提出了组播分布式访问控制系统MDAC,并提出了基于二叉授权委托树的委托证书路径(DCP)查找算法。
Routers are playing an important role in the network flow of the computer -network increasingly, where the key technology is the configuration of access control lists.
路由器在计算机网络流量控制方面的作用日益显著,其关键技术就是访问控制列表的配置。
With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.
随着信息技术在风力发电中的应用,风电场SCADA系统的安全访问控制变得越来越重要。
Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.
目前在国内的设备生产厂商中,能够生产骨干层网络交换机的厂商为数不多,所以,在骨干层网络交换机上的访问控制列表技术在国内是处于领先地位的。
应用推荐