英语人>词典>汉英 : 访问控制 的英文翻译,例句
访问控制 的英文翻译、例句

访问控制

词组短语
access control
更多网络例句与访问控制相关的网络例句 [注:此内容来源于网络,仅供参考]

Role based access control is one kind of access control technologies which has been developed in the recent years.

基于角色的访问控制是近年来发展起来的一种访问控制技术,可降低访问控制的复杂度。

Grid access control can solve the problem of resources sharing and managing.

网格安全是网格计算中的一个重要问题,网格的访问控制可以解决网格环境下的资源共享和管理问题,基于角色的访问控制是最具影响的高级访问控制模型。

Also presented herein is the design of dynamic policy allocation with help of active capability .

目前支持的策略有:强制的访问控制、自由的访问控制和基于角色的访问控制等。

This model realized two parallel control strategy as independent access control and collaborative access control. It also supported dynamic flexible management requirements of access control for collaborative ASP system.

该模型实现了自主访问控制和协同访问控制两种访问控制并行的设计思想,支持协同应用服务提供商系统动态柔性的访问控制管理需求。

This paper mainly researches several key technical problems about access control for web services based on SOAP, which includes the architecture design of access control for Web Services based on ABAC, the application of XACML in access control for Web Services, the design and implement of SOAP gateway and SOAP client.

本文主要研究基于SOAP的Web Services访问控制中的几个关键技术问题,包括;基于ABAC的Web Services访问控制体系结构设计、XACML在Web Services访问控制中的应用、SOAP网关和SOAP客户端的设计与实现等。

Attribute based access control model for Web Services is systemic researched, and an architecture of access control for Web Services is designed, which combines the architecture of access control of ABAC and the typical application architecture of Web Services.

系统研究了面向Web Services的基于属性的访问控制模型ABAC,并结合ABAC访问控制架构和Web Services典型应用架构设计了Web Services访问控制体系结构。

Researchers have paid more attention on discretional access control,role-based access control and view based technology,rather than mandatory access control.

目前关于XML安全性的研究主要集中于自主访问控制、基于角色的访问控制和视图技术,而对于强制访问控制很少有研究。

The supporting technologies of network information security are summarized. The unitive authentication systems existing are analyzed in this paper; their virtues and shortcomings are discussed.2. About the distributed peculiarities of allied resource, the concept of alliance grid is established. The access control model of alliance grid is established by directive ideas of access control security of alliance grid. AG-RBAC model is set up in the basic of common RBAC, interbedded relations between roles are set forth.

针对制造联盟企业资源分布式的特点,提出了联盟网格的概念;根据联盟网格安全访问控制的指导思想,提出了联盟网格访问控制模型;在一般RBAC模型的基础上提出了基于角色的联盟网格访问控制模型,清晰的表述了角色之间的层次关系;初步分析了AG-RBAC的实现模式,重点讨论了角色定义和权限配置的实现方法。

An improved shceme for the old double-way authentication access control scheme based on Harns digital signature is proposed. The new double-way authentication protocol of the improved access control scheme can prevent man-in-the-middle attack and replay attack. After strict formal analysis with BAN logic, the result have proved that the authentication protocol is secure. The improved access control scheme is realized by the mode of single-key-lock-pair. Under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

作为对原双向认证访问控制方案的改进,改进后的双向身份认证协议可以很好的抵抗中间人攻击和重放攻击,经过严密的BAN逻辑形式分析和论证,结果表明该协议是安全的;改进后的访问控制方案用单钥-锁对方案实现,除保持了一般单钥-锁对方案的良好动态特性外,在不需要访问权限递增假设下,实现了用户对文件的多种访问控制权限,并大大减小了溢出问题的发生可能

When detecting that the communication between an external processing unit and the CPU gets into a runaway state while the CPU is performing a memory access to the external processing unit in a handshaking method, the runaway detection control unit outputs a pseudo acknowledge signal to the memory access control unit, in place of the normal acknowledge signal.

备有监视设置在微计算机(1)的外部的外部处理单元和存储访问控制装置(11)的通信的失控检测控制装置(12)。失控检测控制装置(12),当CPU(10)以同步交换方式对外部处理单元存储访问时,在检测出外部处理单元与CPU(10)的通信成为失控状态的情形下,代替标准确认信号(DK23)将拟似确认信号输出到存储访问控制装置(11)。

更多网络解释与访问控制相关的网络解释 [注:此内容来源于网络,仅供参考]

access control:访问控制

图 5:WebDAV 收集创建 -- 访问控制(Access Control)如果您第一次经历自动部署过程,您必需在项目属性的 Deploying 类别中提供所有表单信息. 选择 WebDAV 部署方法,并提供服务器名称或使用端口号提供 IP 地址、目标目录和 WebDAV 用户 -- 密码值对.

access control mechanism:访问控制机制

接入认证:network access control | 访问控制机制:Access Control Mechanism | 域访问控制:domain access control

access control list:访问控制列表

路由器的"访问 控制列表"(Access control list)功能能实现上述要求. 什么是路由器的访问控制列表功能? 路由器提供了基本的通信流量过滤的能力--这就是访问控制列表,它是路由器一系列的允许和拒绝陈述语句集合的命令行,这些陈述语句对用户的数据包中包含的地址(IP地址...

ACE:访问控制条目

DACL与SACL中又有若干项具体的"访问控制条目(ACE)"(每一个ACE包括一个安全标识符(SID),这个标识符标识这个ACE的应用对象(用户或小组)以及允许或者拒绝访问的ACE信息的类型).

access control code:存取控制码,访问控制码

access control category 存取控制类别 | access control code 存取控制码,访问控制码 | access control field 访问控制域,访问控制字段,存取控制字段

ACCESS CONTROLS:(访问控制)

关键的变化包括对扩展属性(extended attributes)以及 POSIX 标准的访问控制(access controls)的支持. 新的扩展属性子系统的第一个用途就是实现 POSIX 访问控制链表. POSIX 访问控制是标准 UNIX 权限控制的超集,支持更细粒度的访问控制.

ACCESS CONTROLS:访问控制选项

timeouts 定义超时的选项 | access controls 访问控制选项 | administrative parameters 管理参数选项

ACCESS CONTROLS:(访问控制)学习了

7.TIMEOUTS(超时)学习了 | 8.ACCESS CONTROLS(访问控制)学习了 | 9.ADMINISTRATIVE PARAMETERS(管理参数)学习了

medium grained:中粒度访问控制

MDI 介质相关接口 | medium grained 中粒度访问控制 | message systems 信报系统

MAC:媒体访问控制

过滤 MAC 地址:"媒体访问控制"(MAC) 地址过滤在理论上很动听. 世界上每台网络设备都有唯一的 MAC 地址,因此通过限制能够与您的无线网络关联的那些 MAC 地址,您就可以消除被入侵的可能性,对吗?不对. 问题是 MAC 地址随着数据包的报头发送,