• Trusted IP equipment proposed access control technology is proposed in this paper.

    提出了IP设备可信接入控制技术

    youdao

  • Based on this provisional authorization model, several problems of XML access control technology are discussed in detail.

    临时授权模型基础之上,我们详细讨论了XML访问控制若干技术问题

    youdao

  • Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.

    主流访问控制技术是从系统整体考虑,提供实施访问控制策略技术平台

    youdao

  • The computer access control technology as a very important part of information assurance area has been researched widely and thoroughly.

    计算机访问控制信息安全领域中的重要技术,正在展开深入、广泛研究与应用。

    youdao

  • Access control technology is an important research project, it is very significant for guarantee the integrality and authentication of information.

    存取控制技术研究信息安全领域一项重要的研究课题研究对于保证信息完整性认证有着重要的意义。

    youdao

  • The object of wireless media access control technology is to improve the system throughput, ensure fairness and reliability and reduce access delay.

    无线媒体接入控制技术提高系统吞吐率保证公平性可靠性降低接入时延为主要目标

    youdao

  • Radio frequency identification (RFID) technology and biometric feature recognition technology have become the mainstream of modern access control technology now.

    射频识别(RFID)技术生物特征识别技术如今已经成为当代门禁技术主流

    youdao

  • The medium access control Technology focuses on multi-address access, that is, how to coordinate users sharing a common channel to achieve efficient and reliable transmission.

    媒体接入控制技术的核心问题如何协调多个用户共用一个信道实现高效可靠传输,多址接入问题。

    youdao

  • In this article, we firstly analyze access control technology of current operating system. Then we discuss the three dimension access model, based on traditional access control model.

    论文首先分析了现有操作系统访问控制技术然后传统访问矩阵模型的基础上,讨论访问矩阵模型,提出了基于程序的访问控制思想。

    youdao

  • Parents can make use of programs that control access to the Internet, but adolescents in this age group are quite savvy about technology and the Internet.

    父母可以利用程序控制孩子使用电脑,但是这个年龄阶段的青少年技术互联网非常精通

    youdao

  • The movie and recording industry, online music stores, and electronic book publishers all use their own specific DRM technology to control access to their data.

    电影以及唱片行业在线音乐商店以及电子书籍出版商都会使用特定DRM技术控制数据访问

    youdao

  • Middleware technology is available to orchestrate services and control access to specific functionalities in the service.

    可以使用中间件技术服务进行组合,服务中的特定功能进行访问控制

    youdao

  • For the first time in TB control, we are enabling access to state-of-the-art technology simultaneously in low, middle and high income countries.

    结核病控制方面,我们使收入国家同时获得先进技术尚属首次

    youdao

  • Access to science and technology empowers women to take control of their health and enables women and girls to participate in specialized training and educational programmes.

    获得科学技术使妇女掌控自身健康,也使妇女女童参加专门培训教育规划之中。

    youdao

  • Workflow technology is widely applied in e-government systems, but the access control problems in workflow system are still not received enough recognitions and not effectively resolved.

    工作流技术广泛应用电子政务系统中,工作流系统中的访问控制问题没有引起足够重视得到有效解决。

    youdao

  • For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.

    有关更多信息请参见如何添加移除访问控制列表ACL技术概述

    youdao

  • The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.

    论文研究基于角色访问控制技术及其法院系统中的应用

    youdao

  • The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.

    访问控制模型技术研究工作流系统安全机制核心,也是信息安全领域的一个热点问题。

    youdao

  • It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.

    本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制

    youdao

  • Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path (DCP) searching algorithm based on binary tree.

    基于SPKI技术提出组播分布式访问控制系统MDAC,并提出了基于二叉授权委托的委托证书路径(DCP)查找算法

    youdao

  • Routers are playing an important role in the network flow of the computer -network increasingly, where the key technology is the configuration of access control lists.

    路由器计算机网络流量控制方面作用日益显著,其关键技术就是访问控制列表配置

    youdao

  • With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.

    随着信息技术风力发电中的应用风电场SCADA系统安全访问控制变得越来越重要。

    youdao

  • Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.

    目前国内设备生产厂商中,能够生产骨干网络交换机的厂商为数不多,所以,在骨干层网络交换机上的访问控制列表技术在国内处于领先地位的。

    youdao

  • This paper has presented a scenario that using PKI technology to RBAC and implicating the PKI makes security authorized access control.

    本文提出一种将PK I技术RBAC技术相结合的方案,实现基于身份认证的安全访问控制

    youdao

  • The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.

    保证网络安全核心策略之一也是信息安全技术的重要组成部分。

    youdao

  • To address this thesis, this paper focuses on the dynamic and heterogeneous characteristic of Grid, and presents a new access control method based on semantic technology.

    为了更好地解决网格系统中的访问控制问题,本文网格系统的动态性异构性出发,提出了一种新的基于语义技术的网格访问控制方法

    youdao

  • OPC applies OLE (Object Linking and Embedding) technology into Industry Process Control Fields, and provides a kind of standard data access method.

    OPC把对象链接嵌入技术应用于工业过程控制领域工业控制领域提供了标准数据访问机制

    youdao

  • Traditional cryptography technology focused on the access control and confidentiality communications of digital products, but for authentication and copyright piracy tracing it is insufficient.

    传统密码学技术侧重数字产品访问控制保密通信但是版权认证盗版追踪问题显得力不从心。

    youdao

  • In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.

    安全模块中,使用了用户认证通讯加密审计追踪访问控制等安全技术,并且引入了模糊控制专家系统。

    youdao

  • Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.

    本文通过SSL及其关键技术研究,提出了网络数据库系统的用户访问控制使用基于SSL证书的双向身份认证

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定