• This article is on an access control technology for.

    篇文章访问控制技术

    youdao

  • The paper researches the PKI, PMI and access control technology.

    论文主要研究和分析PKIPMI系统访问控制技术

    youdao

  • Trusted IP equipment proposed access control technology is proposed in this paper.

    提出了IP设备可信接入控制技术

    youdao

  • UCON model has become a hot research as the next generation of access control technology.

    作为下一代访问控制技术使用控制(ucon)模型已经成为访问控制技术研究热点

    youdao

  • Based on this provisional authorization model, several problems of XML access control technology are discussed in detail.

    临时授权模型基础之上,我们详细讨论了XML访问控制若干技术问题

    youdao

  • Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.

    主流访问控制技术是从系统整体考虑,提供实施访问控制策略技术平台

    youdao

  • The computer access control technology as a very important part of information assurance area has been researched widely and thoroughly.

    计算机访问控制信息安全领域中的重要技术,正在展开深入、广泛研究与应用。

    youdao

  • Access control technology is an important research project, it is very significant for guarantee the integrality and authentication of information.

    存取控制技术研究信息安全领域一项重要的研究课题研究对于保证信息完整性认证有着重要的意义。

    youdao

  • The object of wireless media access control technology is to improve the system throughput, ensure fairness and reliability and reduce access delay.

    无线媒体接入控制技术提高系统吞吐率保证公平性可靠性降低接入时延为主要目标

    youdao

  • Radio frequency identification (RFID) technology and biometric feature recognition technology have become the mainstream of modern access control technology now.

    射频识别(RFID)技术生物特征识别技术如今已经成为当代门禁技术主流

    youdao

  • The medium access control Technology focuses on multi-address access, that is, how to coordinate users sharing a common channel to achieve efficient and reliable transmission.

    媒体接入控制技术的核心问题如何协调多个用户共用一个信道实现高效可靠传输,多址接入问题。

    youdao

  • In this article, we firstly analyze access control technology of current operating system. Then we discuss the three dimension access model, based on traditional access control model.

    论文首先分析了现有操作系统访问控制技术然后传统访问矩阵模型的基础上,讨论访问矩阵模型,提出了基于程序的访问控制思想。

    youdao

  • Parents can make use of programs that control access to the Internet, but adolescents in this age group are quite savvy about technology and the Internet.

    父母可以利用程序控制孩子使用电脑,但是这个年龄阶段的青少年技术互联网非常精通

    youdao

  • The movie and recording industry, online music stores, and electronic book publishers all use their own specific DRM technology to control access to their data.

    电影以及唱片行业在线音乐商店以及电子书籍出版商都会使用特定DRM技术控制数据访问

    youdao

  • Middleware technology is available to orchestrate services and control access to specific functionalities in the service.

    可以使用中间件技术服务进行组合,服务中的特定功能进行访问控制

    youdao

  • Explain the technology and media access control method for Ethernet networks

    解释以太网技术介质访问控制方法

    youdao

  • For the first time in TB control, we are enabling access to state-of-the-art technology simultaneously in low, middle and high income countries.

    结核病控制方面,我们使收入国家同时获得先进技术尚属首次

    youdao

  • Access to science and technology empowers women to take control of their health and enables women and girls to participate in specialized training and educational programmes.

    获得科学技术使妇女掌控自身健康,也使妇女女童参加专门培训教育规划之中。

    youdao

  • Workflow technology is widely applied in e-government systems, but the access control problems in workflow system are still not received enough recognitions and not effectively resolved.

    工作流技术广泛应用电子政务系统中,工作流系统中的访问控制问题没有引起足够重视得到有效解决。

    youdao

  • In this paper, an Area Access Control System based on RFID technology has been introduced.

    本文介绍了一种基于RFID技术小区门禁系统

    youdao

  • Medium Access Control (MAC) protocol is the key technology in wireless ATM systems.

    媒介接入控制(mac)层协议无线atm的一项关键技术

    youdao

  • For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.

    有关更多信息请参见如何添加移除访问控制列表ACL技术概述

    youdao

  • The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.

    论文研究基于角色访问控制技术及其法院系统中的应用

    youdao

  • The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.

    访问控制模型技术研究工作流系统安全机制核心,也是信息安全领域的一个热点问题。

    youdao

  • Access control is the central technology of the security of database.

    访问控制实现数据库安全核心技术

    youdao

  • It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.

    本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制

    youdao

  • Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path (DCP) searching algorithm based on binary tree.

    基于SPKI技术提出组播分布式访问控制系统MDAC,并提出了基于二叉授权委托的委托证书路径(DCP)查找算法

    youdao

  • Routers are playing an important role in the network flow of the computer -network increasingly, where the key technology is the configuration of access control lists.

    路由器计算机网络流量控制方面作用日益显著,其关键技术就是访问控制列表配置

    youdao

  • With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.

    随着信息技术风力发电中的应用风电场SCADA系统安全访问控制变得越来越重要。

    youdao

  • Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.

    目前国内设备生产厂商中,能够生产骨干网络交换机的厂商为数不多,所以,在骨干层网络交换机上的访问控制列表技术在国内处于领先地位的。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定