互相授權 的英文怎麼說

中文拼音 [xiāngshòuquán]
互相授權 英文
cross-authorization
  • : 代詞(相互;彼此) each other; mutual
  • : 相Ⅰ名詞1 (相貌; 外貌) looks; appearance 2 (坐、立等的姿態) bearing; posture 3 [物理學] (相位...
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 互相 : mutual; each other
  • 授權 : empower; authorize; warrant
  1. Compared with the chain store operation, franchising is characterized with the following. the assets of franchisees are independent of the franchisors " and franchisors have no ownership of the franchised units. the franchisee has to assume sole responsibility for its operation including both enjoying profits and taking risks on its own

    與常見的連鎖經營比,特許經營有著以下三個明顯特徵:特許經營中特、受許雙方的資產獨立性,也就是加盟者對其店鋪擁有所有,店鋪經營者是店鋪的主人;各個特許加盟商實行獨立核算、自負盈虧;特許經營公司與其成立的特許店之間的關系是平等利的合同關系。
  2. In part i, a blank bill is issued under the conditions that a drawer intentionally makes several necessary items vacant and authorizes the counterpart to complete them. a blank bill has different names in different countries ; a blank bill has come into being on the basis of violating the traditional bill theories and of contacting the long - term practice. the laws on negotiable instruments in most states as well as regions have undergone the process with a blank bill not being admitted to being done

    本文從四方面進行立論:第一部分:空白票據是發票人有意空缺若干必要記載事項並對人補記齊全而簽發的票據,各國對空白票據的稱呼不盡雷同;空白票據是在與票據傳統理論疏離和長期票據實踐牽連中「生長」起來的,各國各地區票據法對空白票據大都經歷了堅決說「不」到樂于承認的過程。
  3. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
  4. Dvn is able to generate revenues from licensing fees on the estimated 3 million dvn designated stbs to be sold in the province, from the provision of systems software and the related services as the migration rolls out, and from sharing of revenues generated from tv - commerce, interactive games, e - government, tv sms and other value - added services

    省內對數碼機頂盒的需求因此估計達300萬部,天地數碼可因生產機頂盒提供系統軟體及關服務,以及在電視廣告動游戲電視政務電視簡訊及其他增值服務之收入分成,引入可觀的收入。
  5. 2001 - this kone - toshiba alliance was strengthened as the companies signed a historic agreement to exchange shares and extend toshiba s license to market elevators based in kone monospace

    2001年通力與東芝之間的聯盟因簽訂了一項歷史性的協議而得以進一步加強,協議包括持股,東芝利用通力monospace
  6. Of japan. 2001 - this kone - toshiba alliance was strengthened as the companies signed a historic agreement to exchange shares and extend toshiba s license to market elevators based in kone monospace

    2001通力與東芝之間的聯盟因簽訂了一項歷史性的協議而得以進一步加強,協議包括持股,東芝利用通力monospace無機房技術製造自己的無機房電梯。
  7. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換協議驗證身份后,通過查詢數據庫得到用戶關的策略,並把策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序部分進行擴展,使其支持嵌入在代理證書中的策略,並結合本地的安全策略做出最終決策。
分享友人