Therefore it is necessary to research the damage law and security access technology of the pearlite heat resistant steels.
因而有必要研究珠光体耐热钢的损伤规律及安全评估技术。
Companies and policy makers must also tackle misaligned incentives around issues such as privacy and security, access to data, and technology deployment.
企业和政策制定者必须克服这些关于隐私安全、数据访问、技术部署等问题的不对称诱因。
The access and communications capabilities require the latest in proven security technology for extremely large, wide-area communications networks.
这种访问和通讯能力需要在极其巨大的广域通信网络最新被证明的安全技术的支持。
Access control is the central technology of the security of database.
访问控制是实现数据库安全的核心技术。
This paper puts forward a grid architecture based on component technology, and gives detailed descriptions on the components support environment, user access gateway and security management.
提出了一种基于组件技术的网格环境架构,并对其中的组件支撑环境、用户访问网关及安全管理等方面进行了详细描述。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
This paper has presented a scenario that using PKI technology to RBAC and implicating the PKI makes security authorized access control.
本文提出了一种将PK I技术与RBAC技术相结合的方案,实现了基于身份认证的安全访问控制。
The thesis also analyses the design plan of system database, including its security, transaction management and ADO data access technology.
然后,论文论述了系统数据库的设计过程,其中包括安全性设计、事务管理的设计以及ADO数据访问技术的分析及运用。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
Access control is an important technology in system security.
访问控制是系统安全的重要技术。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.
它是保证网络安全的核心策略之一,也是信息安全技术的重要组成部分。
The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.
开放式的架构系统,且与大约30个技术合作伙伴有着密切的合作,包括视频管理,访问控制和实体安全信息管理系统。
The thesis researches on the identity authentication and access control in information security technology.
本文从身份认证、访问控制等方面对信息安全的相关技术进行了分析和研究。
Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.
访问控制技术是网络安全的一项基本技术,主要包括基于角色的访问控制和基于任务的访问控制等技术。
Lastly, along with campus fact and equipment, using technology of VLAN, NAT, router access-list and network traffic flow monitoring system, we carry out basic security defense of campus network.
最后,结合校园网的实际,根据现有设备条件,运用VLAN技术、NAT技术、路由器访问列表以及流量监控实现了对校园网的基本安全防护。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
The security analysis proves the feasibility of combining the APN technology with the VPN technology in the GPRS access system.
通过安全性分析证明了APN专线技术和VPN加密认证技术结合运用在GPRS接入系统的可行性。
Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
无线异构网络中的关键安全技术包括安全路由协议、接入认证技术、入侵检测技术、节点间协作通信等。
The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.
可采用单点登陆、PKI认证、授权、基于角色的权限分配策略、利用应用网关访问资源,开发适合本系统的工作流访问机制等措施确保信息平台的安全。
Men have significantly more access to the web, but when women get connected, they use technology as a pathway to better education, health, economic status and security.
虽然男性连线上网的机会要多得多,不过如果女性也能使用网络,她们就能借助科技手段,寻求更好的教育、健康、经济地位与人身安全。
And then, the paper analyzes the MatchMaking model, includes the point technologies, for example buffer technology, data access technology, security technology.
之后对撮合模块进行了重点分析,并介绍了其使用的关键技术,比如缓存方案,数据访问方案,安全性考虑以及故障恢复考虑等。
And then, the paper analyzes the MatchMaking model, includes the point technologies, for example buffer technology, data access technology, security technology.
之后对撮合模块进行了重点分析,并介绍了其使用的关键技术,比如缓存方案,数据访问方案,安全性考虑以及故障恢复考虑等。
应用推荐