• Out there in that infinite universe are many of the most private details of our lives... and we have no control over what businesses access and manipulate them.

    而这无限宇宙包含我们私人生活绝大多数细节...我们公司获取利用哪些数据没有丝毫的控制力。

    youdao

  • However, this centralization is risky for several reasons, not least of which is giving a third party total control over your access to services, and possibly your private data.

    然而由于种种原因这种集中非常危险,不仅是因为使第三完全控制服务访问并且可能控制您的私人数据。

    youdao

  • New! Botnet Detection -prevents others from taking control of your PC to access your private information or use it to host an attack.

    僵尸网络检测阻止他人控制电脑存取私人信息使用举办一次攻击

    youdao

  • Combining security of SSL protocol and find-grained access control, SSL VPN(Secure Socket Layer Virtual Private Netwrok) does well in resolving this problem.

    结合SSL加密特性粒度的访问控制,很解决了上述问题

    youdao

  • Do some research on the protection of the private information of ENUM users and the access control of ENUM resource record, and propose a solution based on the authentication of ENUM record access.

    研究ENUM用户隐私信息保护,对ENUM记录资源访问进行权限控制提出基于用户认证的ENUM记录级授权访问解决方案

    youdao

  • A problem that child role cannot obtain private permissions because of inherited relation in the Role-Based Access Control (RBAC) model is researched.

    针对基于角色访问控制(RBAC)模型由于继承关系产生角色不能拥有私有权限问题进行了研究。

    youdao

  • We establish sufficient conditions under which it is revenue-maximizing for the seller to grant each private type of the buyer full access to all additional private information under her control.

    研究一个结果我们建立每个类型买方充分了解信息披露政策能给卖方带来最大利润的充分条件

    youdao

  • The results showed the model with single-log-in could access to resources in PULL mode, protect the private privacy and the access control policy and could be implemented easily.

    分析表明,模型具有单点登录、PULL模式访问资源用户隐私保护、访问控制策略保护、易于实现的特点。

    youdao

  • The scheme is based on the user access control and it defines a fine access control mode. It is very suitable for the case that need to authenticate the user of the private network.

    方案用户认证基于用户权限进行的,定义良好的资源访问控制模式非常适合实际系统对内部网络用户有认证要求的场合。

    youdao

  • In this paper, we introduce the role-based access control model, analyse the role hierarchy model and the problem of private permissions in RBAC96, and point out the disadvantage of Sandhu s solution.

    针对著名 RBAC96模型的不足之 ,结合私有权限、部门权限权限属性变化等问题 ,对角色权限角色层次关系进行了分析 ,提出了一个改进的角色层次化关系模型 。

    youdao

  • In this paper, we introduce the role-based access control model, analyse the role hierarchy model and the problem of private permissions in RBAC96, and point out the disadvantage of Sandhu s solution.

    针对著名 RBAC96模型的不足之 ,结合私有权限、部门权限权限属性变化等问题 ,对角色权限角色层次关系进行了分析 ,提出了一个改进的角色层次化关系模型 。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定