Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.
中央工具在单一位置存储整个网络的用户标识和访问控制信息,并提供用于进行全面管理的界面。
Users can then access services on other machines that participate in this trusted network without again being prompted for a user ID and password.
用户然后可以访问参与此受信任网络的其他计算机上的服务,而不会再次提示用户ID和密码。
Presence is the function needed to publish a user's access points on the network and the capabilities of that user at each point of presence.
为了在网络上发布用户访问点和在每个存在点发布用户所需的功能,必须具有显示存在情况的功能。
They are responsible for the control of user access to the network.
他们的责任是控制用户对网络的访问。
Network switch – A new private network for message traffic using NIC that would be used for public network user access.
网络交换机 –一个使用NIC 的面向消息通信的新私有网络,用于公共网络的用户访问。
And that means when someone tries to access your site from that network, they'll be blocked, too... meaning you've just cut your user base.
这意味着当有人尝试从这个网络访问您的站点时,他们也将受到阻塞,这也将缩减您的用户群。
Specifically, if everything is happening in a single thread, performing long operations such as network access or database queries on the UI thread will block the whole user interface.
特别是,如果把所有的事件都放在主线程中来处理,需要长时间来处理的事件比如网络访问或者数据库查询,会阻塞整个UI。
User and Application Access to Wireless Hosted network.
用户和应用程序如何使用无线承载网络?
The following command causes a user logging in from a network access server to have immediate access to EXEC commands.
下面的命令可以使一个用户从网络访问服务器登录,并获得对EXEC命令的立即访问。
Ensure that the default Vista NETWORK user can access the certificates.
确认默认的Vista NETWORK用户可以访问证书。
The IMS architecture delivers multimedia services that a user can access from various devices using an IP network or the traditional telephony system.
IMS体系结构可提供多媒体服务,供用户从使用IP网络或传统电话系统的各种设备进行访问。
The app caches-or makes available offline-user account and reservation information, in case he or she needs to access it while located in an area without network signal coverage.
这个程序能让用户保存或脱机查看其账户和预订信息,以便在没有网络信号覆盖的地方继续使用。
Hosted application virtualization allows the user to access applications from their local computer that are physically running on a server somewhere else on the network.
托管应用虚拟化允许用户从本地机器上访问物理上运行在网络某处的程序。
To access information on the Internet, a user must first log on, or connect, to the client computer's host network.
要访问因特网上的信息,用户必须首先登录或连接到客户机的主机网络。
It control what users can log on to the server and access control of the cyber source, user access time and network in which workstations.
它控制哪些用户能够登录到服务器并获取网络资源,控制用户入网的时间和在哪台工作站入网。
Perhaps your code needs to cache user Settings or a temporary data file but the default security cannot allow network-deployed code to access the general file system.
可能您的代码需要缓存用户的设置或者一个临时数据文件,但是默认的安全性与允许网络部署代码访问这个文件系统。
Mining of Internet message is analyzing and mining network access action of Internet user so as to obtain mode for describing memory rule.
互联网使用信息的挖掘就是对互联网用户网络访问行为进行分析挖掘,以获得描述其中内存规律的模式。
Theoretically, every user with access to the network could install a DHCP server to give out illegal IP Numbers.
理论上,有网络的存取的每个用户能安装一个动态宿主配置协议服务器给出不合法的IP数字。
Because a wireless access point is public to all inside user, intruder and distrustful user can enter wireless network to access all kinds of source easily.
一个无线访问点对内部的所有用户都是公开的,入侵者及不受信任的用户可以很容易的进入无线网络访问各种资源。
Furthermore, the user is no longer limited by the network speed and can now access the data at the speed of the device.
此外,也减小了网络限制和提高访问速度到达设备的速度。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
This article emphases on the user access of CNGI network.
本文对CNGI网络用户接入的各种方式进行了讨论分析。
This paper studies how the 3g radio access network side PKI applications to achieve the confidentiality of the identity of the user.
本文主要研究了如何在3g的接入网端应用无线pk I来实现用户身份的机密性。
By applying carefully the database functions of transaction handling and concurrent access, the platform guarantees data reliability and data integrity in multi user network environment.
该系统还利用了数据库自身的事务处理与并发控制功能,解决了在多用户网络环境下的数据完整性和可靠性问题。
This program supports people with access to chat rooms, first through the "Settings" module to set user network information, and to opt for chatting to chat.
此程序支持多人一起进入聊天室,首先要通过“设置”模块设置用户网络信息,然后才能选择聊天对象进行聊天。
File service is provided that encrypts data of file transparently for users. Each user has a different key for encryption, users access the storage system by network driver mapping.
系统为用户提供了透明的文件加解密服务,用户通过映射网络驱动器的方式访问自己的存储空间。
Two methods of communication among the users who access the network is introduced in the paper. It is discussed the design and implementation of variable IP address user communication support system.
本文介绍了接入内部网的用户间通信的两种方法,着重介绍了可变ip地址用户间通信支持系统的设计与实现。
The AAA server typically interacts with network access and gateway serve and with databases and directories containing user information.
AAA服务器通常与网络访问和网关服务,包含用户信息数据库和目录。
The method according to the invention is characterized in that, an interface (5) between the user (1) of the network (7) and a network access functions as a line of demarcation (4).
根据本发明的方法特征在于,网络(7)的用户(1)和网络接入之间的接口(5)用作分界线(4)。
The method according to the invention is characterized in that, an interface (5) between the user (1) of the network (7) and a network access functions as a line of demarcation (4).
根据本发明的方法特征在于,网络(7)的用户(1)和网络接入之间的接口(5)用作分界线(4)。
应用推荐