英语人>网络例句>访问控制 相关的搜索结果
网络例句

访问控制

与 访问控制 相关的网络例句 [注:此内容来源于网络,仅供参考]

It gives you the power to view and control your access control system from anywhere in the world.

它能够让你从世界上任何地方来查看和控制您的访问控制系统。

In a distributed database environment, which of the following is a test of control for access control administration?

在一个分布式数据库环境中,下面哪一个是对访问控制管理的一个控制测试?

For fine-grained control, SSFs may be used in access controls.

为了能精密控制,SSF 可以在访问控制中使用。

An access list has been designed to prevent HTTP traffic from the Accounting Department from reaching the HR server attached to the Holyoke router.

问题:设计一个访问控列表阻止http流量从财务部到人力资源部,以下哪一个访问控制列表配置正确?

So can visit the database directly , no longer need involvement of WEB database ; The control of users visiting can be solved quick-wittedly, improve the security ; Meanwhile , the JDBC database can realize being mutual with users conveniently , offer abundant figure function and sound, such information functions of the multimedia as the video ,etc..

所以可以直接访问数据库,不再需要WEB数据库的介入;用户访问控制可以由数据库服务器本地的安全机制来解决,提高安全性;同时,可以方便地实现与用户交互,提供丰富的图形功能和声音,视频等多媒体信息功能。

So can visit the database directly , no longer need involvement of WEB database ; The control of users visiting can be solved quick-wittedly, improve the security ; Meanwhile , the JDBC database can realize being mutual with users conveniently , offer abundant figure function and sound, such information functions of the multimedia as the video,etc.

所以可以直接访问数据库,不再需要WEB数据库的介入;用户访问控制可以由数据库服务器本地的安全机制来解决,提高安全性;同时,可以方便地实现与用户交互功能。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制

Secondly,compared with above demands,it analyzes existing actuality and disparity of our information systems and also points out that sharing model in the current space our information systems is still "point-to-point".Thirdly,the solution based on the"shared space" and pulish/subscribe,is proposed.

第三,提出了以共享空间为基础,以发布/订阅为信息交换手段的共享解决方案,并且进一步给出了系统的共享模式,提出了由数据资源、元数据管理、基于内容的搜索、信息访问和发布/订阅、用户访问控制等组成的分层的框架结构。

A buffer is created in main memory and the number the database server accessed reduces and the burthens the database server assumes lighten. In order to achieve the request of easy expansion and upgraded in the task, through studying module of Struts frame, the view of fulfilling function of access and controlling through Filter module is put forward.

为了达到研究任务中要求的易于扩展和升级的要求,通过对组成Struts框架的各组件的研究,提出了由Filter组件实现访问控制功能的观点,利用Filter组件可以通过配置文件方便地装配到应用程序中的特性,解除访问控制程序和应用程序之间的耦合,达到更容易升级和扩展应用程序的目的。

When receiving the pseudo acknowledge signal via the memory access control unit, the CPU switches the memory access method for the external processing unit to the fixed waiting mode.

CPU(10),当通过存储访问控制装置(11)接受拟似确认信号时,将与外部处理单元的存储访问方式切换到固定等待模式。

第5/28页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher