英语人>网络例句>访问控制 相关的搜索结果
网络例句

访问控制

与 访问控制 相关的网络例句 [注:此内容来源于网络,仅供参考]

Access control model is the foundation of the realization of access control in the system.

访问控制模型是访问控制实现的基础。

In this paper, the heterogeneity of resource is not discussed and the topic is on the focus of the access control issue in sharing mechanism. The system of information grid consists of heterogeneous administrative domain in which the access control mechanism and security policy are not uniform.

信息网格是一个由访问控制机制和安全策略不同的异构管理域组成的环境,不同的域可能有不同的访问控制目标和要求。

Third-Party Logistic of Warehouse Management System Framework provides a series of reusable groupware, such as persistence layer which introduces Dynamic Value Object, Value List Hander and Command pattern. It encapsulates the details of accessing database and affords the interface of different persistence layer framework. Based on Asynchronous JavaScript and XML, we develops the client validity check engine, dynamic cascading menu and common, dynamic tree structure groupware, as well as a set of tag library which include query, pagination, cache and so on. It reduces the code redundancy and predigests the development of interface layer enormously.

第三方物流管理系统框架提供了一系列可复用组件,例如采用动态VO、值列表处理器以及命令模式的持久层组件,封装了数据库访问细节,并为不同的持久层框架提供调用接口;基于Ajax(Asynchronous JavaScript and XML)技术的客户端校验引擎、动态级联菜单以及通用动态树型结构组件,一系列查询、分页、缓存等标签库则减少了表示层的代码冗余,简化了表示层开发;基于SSL登录以及基于角色的访问控制的安全子系统则初步实现了数据安全传输和权限控制;此外基于Web服务的企业应用集成模型为今后系统集成、数据共享提供了有益探索。

These essential issues are the characters of the access control of the information grid.

信息网格访问控制研究的这几个关键问题是信息网格访问控制的特征。

The static model describes the relationship among user, permission and role and imports integrated inheritance to actualize the relationship between local role and global role. The dynamic model completes access control by session diffluence based on the static model. The actualization for the model is researched based on the analysis of the content and the rule of the model. A self-adapted RBAC wrapper based on agent model is presented according to the heterogeneous databases'demand for wrapper.

该模型比较全面地解决异构数据库系统的局部数据对象和全局数据对象的综合访问控制。I-RBAC模型包括静态模型和动态模型两个部分,静态模型主要描述用户、权限、角色(特别是全局角色与局部角色)之间的关系,动态模型是在静态模型中角色层次关系的基础上通过会话分流实现动态的访问控制

The security mechanisms can improve access control model to impersonate the user access monitoring and control capabilities.

该安全机制能有效提高访问控制模型对冒充用户访问的监测及控制能力。

This can improve the pertinence of the study of flexible access control model.

给出一个形式化的约束访问控制模型,来弥补现有访问控制技术中对约束研究的不足。

If these access control rules are described by XML, the safity of the workflow in managing compound transactions and platform independence will be greatly enhanced.

如果这些访问控制方面较为复杂的规则采用XML描述就会大大提高工作流系统在管理用户的访问控制这些较为复杂的事务方面的安全性与平台的无关性。

Experimental results verify that the model is more efficient and securer than traditional access control model.

近年来,访问控制模型在企业的管理系统中得到广泛的应用,但是,通常很难正确方便地管理访问控制策略,这主要表现在以下2个方面:(1)随着管理系统中用户数量的增加和程序复

But traditional privilege management and access control mode could not provide a unitive and effective method in privilege expression and management, and access control of resource.

但是传统的权限管理和访问控制模式在权限的表达和管理以及资源的访问控制等方面缺乏统一有效的手段。

第3/28页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher