• This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.

    创造了一个非常安全环境因为应用没有许的情况下不能访问系统其他部分的。

    youdao

  • By sitting between the rest of the operating system and the actual disk, CGD looks and ACTS like any other disk drive attached to the system, allowing for transparent access to secure storage.

    CGD位于操作系统中的其他部分实际磁盘之间,CGD可以作为连接系统的其他磁盘设备,允许安全存储数据进行透明访问

    youdao

  • Secure: The system authenticates access to data and services [1]

    安全系统数据服务访问提供认证

    youdao

  • The prototype system realizes the key parts of the secure component: authentication center, message secure proxy and access controler.

    原型系统实现安全构件关键部分认证服务器消息安全代理访问控制器。

    youdao

  • Discretionary Access Control is one of necessary and most common secure mechanisms in the secure operating system.

    自主访问控制机制安全操作系统必不可少、应用广泛安全机制之一。

    youdao

  • With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.

    随着信息技术风力发电中的应用风电场SCADA系统安全访问控制变得越来越重要。

    youdao

  • The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.

    操作系统安全信息系统安全基石访问控制则是操作系统安全机制重要内容。

    youdao

  • Identity authentication is an important part of a perfect secure system, the first defense, and the foundation of secure communication and access control.

    身份认证一个完善的安全系统重要组成部分,是一道安全屏障,它是安全通信访问控制基础

    youdao

  • Virtual Sandbox is a secure software system designed to allow unknown or untrusted programs to be run in an isolated environment without access to personal files, local networks, and system Settings.

    虚拟沙盒安全软件系统旨在使不明不信任程序运行孤立环境中获得个人档案本地网络系统设置

    youdao

  • The access control is one of the most important characteristics in the secure operating system.

    访问控制安全操作系统重要特性之一

    youdao

  • NET technology site in the database and access a secure connection, the system can be transplanted high and has a good business scalability.

    NET技术实现网站数据库安全连接访问系统可以移植性具有良好业务扩展性

    youdao

  • To keep independent object-oriented system secure from Trojan horse, there exists already a restrictive policy that blends information flow control with discretionary access control.

    描述了面向对象系统数据模型,研究了信息流信息传输,并以此为基础给出了基于自主访问控制策略的分布式对象系统的信息流控制方法。

    youdao

  • Yet, they'll still have full, secure, remote access to your company's phone system, data network, customer database, and other tools they need to be productive.

    然而他们还是充分的,安全远程访问公司电话系统数据网络客户数据库其他工具,他们需要得到生产力

    youdao

  • Are the Card Access System records of daily transactions maintained in a secure area for at least 60 days by Security?

    保安部所有出入口的门禁系统日常的检测,且保存检查记录至少60吗?

    youdao

  • Dublin Port Tunnel is the largest ever civil engineering project in Ireland. To meet the client's requirements, the highly secure CEM AC2000 SE (Standard Edition) access control system was chosen.

    都柏林港口隧道需要全面、完整集成的安防管理解决方案,集成各种安防系统。其旨在通过位于主现场控制室的单个安防管理系统集中监控整个隧道,从而为隧道用户创建安全设施和环境。

    youdao

  • Dublin Port Tunnel is the largest ever civil engineering project in Ireland. To meet the client's requirements, the highly secure CEM AC2000 SE (Standard Edition) access control system was chosen.

    都柏林港口隧道需要全面、完整集成的安防管理解决方案,集成各种安防系统。其旨在通过位于主现场控制室的单个安防管理系统集中监控整个隧道,从而为隧道用户创建安全设施和环境。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定