英语人>网络例句>access control 相关的网络例句
access control相关的网络例句

查询词典 access control

与 access control 相关的网络例句 [注:此内容来源于网络,仅供参考]

It does not depend on the access control technology that requires it.

它不依赖于访问控制技术需要它。

If the destination IP address is local ,the router searches an internal store of IP addresses and local-device Media Access Control addresses. This store is known as the Address Resolution Protocol cache.

如果目的IP地址为本地的,该路由器就搜寻存储着IP地址和本地设备介质访问控制地址的内部存储器,这个存储器叫作地址分辨协议高速缓存。

In addition, access control policies of aggregated resources can be formulated as expressions of the algebra. Several algebraic properties of policy expressions are discussed. It shows that the algebraic properties of policy expressions can be used to verify whether policy composition results meet the protection needs of each party.

用代数表达式形式化地描述聚合资源的访问控制策略,讨论了策略表达式的若干代数性质,说明可借助策略表达式的代数性质去验证策略合成结果是否符合各方对聚合资源的保护性需求。

The users are managed based on roles and grades, the types of users are: anonym, student, teacher and administrator, implement secure management by setting access control privilege specially.

另外,文中叙述了目录服务二次开发的实现过程,采用Netscape Directory JAVA SDK开发包,JSP和JavaBeans技术来开发基于WEB的目录服务客户端,使目录服务中的数据能更方便更安全的被访问和管理。

IEEE 802.1x network access control protocol based on port consists of supplicant, authenticator and authentication sever.

基于端口的IEEE 802.1x访问控制协议由申请者、认证者和认证服务器三部分组成。

Access control is an example of authorization.

访问控制是授权的一个例子。

An authorization and access control model for XML documents is proposed in this paper.

提出了一种XML文档的授权与访问控制模型。

This paper proposes a novel central limit theorem based algorithm to detect medium access control misbehaviors of malicious nodes.

针对无线竞争共享型信道中恶意节点不公平使用信道资源的退避访问攻击行为,提出一种新的中心极限定理检测算法。

An information security assurance system of enterprises is divided into the basic security link, enhancement link and extended security mechanism, which are subdivided into such concrete links as identification and authentication, access control, auditing, fire wall, real-time monitoring and information ciphering.

企业信息安全保障体系分为基本安全环节、增强环节和扩充的安全机制三个层次,其中又细分为身份标识和鉴别、访问控制、审计、防火墙、实时监控、信息加密等具体环节,有些是基本的,有些则并非一定要部署。

Circumvention'.'' of the access control process.

这种错误躲过了存取控制进程。

第12/45页 首页 < ... 8 9 10 11 12 13 14 15 16 ... > 尾页
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。