授權過程 的英文怎麼說

中文拼音 [shòuquánguòchéng]
授權過程 英文
authorization process
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : 過Ⅰ動詞[口語] (超越) go beyond the limit; undue; excessiveⅡ名詞(姓氏) a surname
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 授權 : empower; authorize; warrant
  • 過程 : process; procedure; transversion; plication; course
  1. As electronic funds transfers mainly use the bank card as launch tool, however, the present bank card itself has inhesion defaults, such as easily be forged and illegally used, so there have many unauthorized electronic funds transfers, and then it becomes a problem that any country which want to develop it. the loss caused by the third party outside the system is that party, such loss should be beard by the third party, just for sustaining normal operation of the system of electronic funds transfers, when the third party disappears, the loss should be allocated among parties in the system

    由於磁條式銀行卡易被偽造和冒用,使得未經的電子資金劃撥不斷發生,由此而造成的系統內的損失承擔也成為一個難以解決的問題。筆者通考察我國各發卡銀行制定的銀行卡章及領用合同中確定損失分擔的條款,發現這些條款違背了《合同法》第四十條的規定,違背了誠實信用原則,應當認定為無效。
  2. This article contains three parts, five chapters. the first part introduces the incentive models of actual bonus stock synoptically, analyses the stock on hand, option shares and stock option, the three kind of important incentive models, on rights and incumbencies, value and the incentive guidance by contrast. the second part discusses the difficulties and influential factors in the design of technical bonus stock, quests for the incentive models of technical bonus stock, analyses superiority and inferior position in action, difference and interosculation between them, discusses the need and significance for the technical bonus stock reanimation in the middle - small technicalfilms. in order to make use of the technical bonus stock distribution mechanism fully, inspire the talent of technologists, encourage their devotion to films, we have some important discussion on the technical bonus stock distribution policy, introduce the distributed models of technical bonus stock, point out the questions in the excutive course, and offer the solution correspondingly. in the third part, we discuss the technical stock option design on middle - small technical films, and consider the logical thoughtfulness in the course of reanimation as follows : the more outstanding achievement for the powered man the more increase on special target the lower price on technical option premium the more profit the more effective reanimation. in the parameter, a set of detailed program is designed, which includes establishment of incentive fund, institution of merit system for the plan ' s grantors, award of stock option, determination of premium, so as to reduce random in the incentive course, have a great effect on the mormative management for the

    本文內容共分為五章三大部分,第一部分概括性地介紹了現行股激勵方式,對現股、期股和期這三種重要的激勵方式,從利義務、價值和激勵導向三個方面進行了對比分析;第二部分探討了技術股設計的難點和影響因素,討論了我國中小科技企業技術股激勵的方式,分析它們在激勵中的優勢和不足,以及它們之間的區別與聯系,並對中小科技企業實施技術股激勵的必要性和意義進行了探討。在文中還重點討論了中小科技企業技術股分配的策略,介紹了技術股紅利分配方式,指出在技術股激勵中應注意的問題,並提出相應的解決辦法,目的在於充分利用技術股分配機制,來激發技術人員潛在的創新能力,激勵他們為企業作貢獻;第三部分著重探討了中小科技企業技術股份期的方案設計,在激勵方面,按照技術期獲受人的業績越突出特定的指標增長越快行價越低獲利越多激勵效果越好的邏輯思路進行考慮;在參數設計方面,對技術期計劃中激勵基金、予和考核、行價格等參數進行了詳細地分析設計,旨在減少技術期激勵中的隨意性,為中小科技企業的規范化管理起到一定的指導和借鑒作用。
  3. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基於角色的訪問控制、基於任務的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  4. Therefore, the author bring forward some suggest to perfect the company memorandum of ours. for instance, to separate the memorandum of association into two parts ; to distinguish and define the absolute recordation, relative recordation and random recordation ; to substitute the authorized capital system for the legal capital system ; to abolish the " ultra vires rule ", etc. and the author hopes to get consideration from more scholars on the basic theory subject, memorandum of association in corporation law as well as a fruitful result both in legislation and practice by this dissertation

    由此,筆者提出了完善我國公司章制度的若干建議,如:強調通公司章實現公司自治;對公司章在形式上作兩部分區分;明確公司章中的絕對、相對和任意記載事項;用資本制取代法定資本制;取消「越圍原則」對公司經營范圍的限制;強化公司章的可訴性;完善公司章的修改原則、序和限等。
  5. To mark this milestone in the bidding process, london 2012 has commissioned a unique piece of photography featuring gymnasts athletically shaping the number 100 with their bodies

    為了紀念這一申辦中的里碑時刻,倫敦2012奧申委製作了一幅特別的圖片,圖片中體操運動員用身體的運動姿勢組成了數字100的字樣。
  6. Although it is possible to accept the commission ' s submission that the price fixed for the approval procedure of imported vehicles does not affect competition between the various makes of motor vehicles offered for sale in belgium, nevertheless by requiring, in respect of parallel imports of vehicles of one make a rate for the approval procedure which is considerably higher than that applied to vehicles of the same make which are produced or assembled in the country or imported through its own network of approved dealers, a sole authorised agent may distort competition at the level of the distributors, favour its own distribution network and slow down parallel imports from the other member - states

    對于委員會關于固定進口汽車的批準序的價格不會影響提供于比利時境內銷售的不同汽車品牌之間的競爭的辯解,盡管接受它是可能的,但是如果要求一個品牌的汽車的平行進口的許可序所收費率比在國內生產或裝配或者通其自身的經銷商網路進口的同一品牌汽車的費率顯著為高的話,一個獨家代理人可能會扭曲在同一層次經銷商之間的競爭,因為它會偏愛自身的經銷網路而使從其他成員國的平行進口減少。
  7. Use your normal j2ee authorization procedures to authorize access to web services implemented as ejbs

    請使用常規的j2ee授權過程予對實現為ejb的web服務的訪問
  8. The manner of the institutional changes. the elementary action group obtains the benefits of institutional changes by way of founding the secondary action group, using the method of conferring the licence rights. certainly, the path that the elementary action group recognizes the licence rights is to study in this course

    發動制度變遷的方式? ?初級行動團體通次級行動團體來獲取制度變遷的收益,其方式就是通予次級行動團體特許經營,當然,在這個中初級行動團體是通學習認識到了特許經營這種方式。
  9. The fundamental defect of the concept seeing teaching process as a " special process of cognition " is to regard the knowledge impartation as the only objective of teaching and teacher the absolute authority, to ignore the fact that student is the perceiver ( subject ) and has individual character

    把教學視做「特殊的認識」 ,其根本缺陷是以知識的傳為教學的唯一目標,以教師為絕對的威,忽視學生作為具有主體性及完整個性的人的特點。
  10. For example, if the procedure were to create a login, which is a server - level action that requires a server - wide permission, the authenticate server permission would have to be granted to the authenticator of the context

    例如,如果此要創建一個登錄帳戶且此服務器級操作需要服務器范圍限,則必須對上下文的身份驗證者予authenticate server限。
  11. In the process of delegated legislation both the action of delegated power and the action of making laws should abide by the system of delegated legislation. especially granted bodies " making laws must be supervised and controlled

    立法的整個中,無論是行為,還是依進行的立法行為都要遵循立法制度的要求,尤其是受主體的立法行為更要受到監督控制。
  12. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通對系統工作人員分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。
  13. The new functions demand all the primary school and the middle school teachers to : 1 ) become the internal authority for the students but not the external one. 2 ) become the facilitators to the development of the students but not the interpretations of some knowledge. 3 ) act more as an artist for the teaching and learning activities rather than as an only organizer and administrator

    教育的發展為中小學教師職能提出了新的要求: 1 、在師生關繫上,教師作為威逐漸由外鑠的威轉變為內生的威; 2 、在教育教學中,教師由知識的傳者逐漸轉變為學生發展的促進者; 3 、教師作為純粹管理者的角色日益淡化,作為教育教學活動的藝術家的特徵更濃; 4 、教師作為學習研究者的角色特徵日益明顯; 5 、教師作為激勵者的職能開始凸現。
  14. The mechanisms for filtering controls during the authorization process are the

    授權過程中篩選控制項的機制有
  15. Figure 1 illustrates the various entities involved in distributed authorization

    圖1闡述了在分散式授權過程中所涉及的不同實體。
  16. Control goes through an authorization process to determine whether the control can be added

    或服務器控制項都經授權過程以確定是否能夠添加該控制項。
  17. Provides an overview of the authorization process used in. net framework role - based security

    提供關于. net framework基於角色的安全性中使用的授權過程的概述。
  18. Method, because it provides you with greater programmatic control over the whole authorization process, whereas the

    方法,因為它可以對整個授權過程提供更多的編式控制制,而
  19. Traditional access control model hardly consider the issue of subjects ' trust worthiness and privilege partition

    傳統訪問控制模型在授權過程中沒有考慮主體的信任度和限集合劃分等問題。
  20. Based on the fourth version of x. 509 standard and rfc3281 document, the basic idea of pki and pmi as well as x. 509 attribute certificate are explained. in the second part, attribute certificate authorization mechanism of pmi is investigated using an example, including the modification of pmi role model, the asn. 1 syntax definition of role specification certificate and role assignment certificate, the flow design and analysis of attribute certificate authorization mechanism and the validation verification of certificate chain

    其中包括了對pmi角色模型的改進、角色規范證書和角色分配證書的asn . 1語法結構定義、證書的設計與分析以及屬性證書鏈的有效性驗證等;最後,本文根據證書機制設計了一個簡單的pmi特處理模型,並對其中的模型組件、系統運作和設計中考慮到的若干技術細節分別予以了有益的探討。
分享友人