訪問碼控制 的英文怎麼說

中文拼音 [fǎngwènkòngzhì]
訪問碼控制 英文
access code control
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息涉及信息存儲方式、信息權限、用戶身份驗證、密和日誌管理等諸多題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完整性、密技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的標識鑒別機增加了新的用戶安全屬性,即安全標簽和審計掩,以增加對安全操作系統下強存取和審計機的支持。
  4. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全性策略配置目標包括對數據的原始、保護內核和系統軟體的完整性、防止有特權的進程執行危險的代,以及限由有特權的進程缺陷所導致的傷害。
  5. Allows control of code access security permissions

    允許安全權限。
  6. In one typical use of code access security, an application downloads a control from a local intranet host web site directly to the client so that the user can enter data

    在代安全性的一種常見應用場合中,應用程序將項從本地intranet宿主網站直接下載到客戶端,以便用戶能夠輸入數據。
  7. Whether it is signed with a certificate, and so on

    ,以及它是否具有證書簽名等)來可以的資源。
  8. However, an additional variant of the vulnerability was subsequently identified, and on october 30, 2000, the bulletin was updated to advise customers of the availability of an updated patch. the updated patch eliminates all known variants of the vulnerability

    如果用心不良的用戶成功利用了該漏洞,則由服務器的web站點會被用來運行代,轉發信息,並要在所有用戶的計算機上讀取和寫入cookies 。
  9. Represents a combination of a user s identity, an access mask, and an access control type allow or deny

    表示用戶的標識、類型(允許或拒絕)的組合。
  10. Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on

    基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密、條目的添加、刪除、修改、設置組、設置角色和設置等,前臺頁面使用了樹型結構,直觀的反映了目錄服務器中數據的拓撲結構。
  11. 2. a comprehensive framework is developed for the above model. those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on

    完整設計了模型的整個可實現框架:包括各組成模塊的功能、相關數據結構和消息編格式、證書管理庫和密鑰環的設計,以及具體的流程等。
  12. Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic

    以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:數據鏈路層和物理層,並將其細分為一些功能子層,包括數據鏈路層的llc (邏輯鏈路)子層和mac (介質)子層,物理層的pcs (物理編子層) 、 pma (物理介質附加子層)和pmd廈門大學碩士學位論文摘要(物理介質相關于層) 。
  13. This system ' s hardware adopts dsp - embedded controller, which can process digital signal independently. the controller communicates with pc by accessing memory. on the side of controller, c language is used to write the interpolation program and the interruption service program, while on the side of pc, visual c + + is used to write programs in which functions of editing nc - code, real - time control and human - machine interaction interface is fulfilled

    該數系統的硬體採用了具有獨立數字信號處理功能的dsp型運動器,器通過內存與pc機通信,使用c語言編寫了器端的中斷服務和插補程序,使用visualc + +編寫了pc端的數編輯、實時和人機交互界面程序。
  14. This card largely depends on three integrate chips to fulfill its function : 1 ) nic control main chip, corresponding the mac sublayer of ethernet, to realize csma / cd media access protocol, manage the sending and receiving buffers integrated on the chip and provide motherboard pci interface. 2 ) serdes ( serializing and deserializing ) chip, corresponding pcs and pma sublayers in ethernet, mainly to complete 8b / 10b coding and convert 10 bits parallel data to serial data, and convert them again at the receiving end. 3 ) fibre transceiver unit, completing light - electrical conversion of seri

    該網卡主要由3塊集成的晶元完成其功能,分別是i )網路主晶元,對應于以太網的mac子層,主要完成csmaicd介質協議,管理片上集成的發送和接收緩沖區,並提供和主板p0總線的介面: b ) s rd s (串列解串列化器)晶元,對應于以太同的pcs和pma子層,主要完成sb lob編並將10位并行的數據轉換為串列數據,在接收端完成相反的功能:涌)光纖收發器,完成串列數據的光電轉換功能。
  15. File management has the function of 2 - level password management, including passwords of developers and users. this function allows developer to manage the access right to hardware and issue different access control rights to different users. 1

    檔管理系統具有2級密管理功能,包括開發商口令和用戶口令,開發商可以使用此功能對硬體的許可權進行管理,可以對不同的用戶開放不同的許可權。
  16. Any access control entry with a zero - access mask is removed

    具有零的任何項( ace )將被移除。
  17. Class. when paginating, the asp. net iterates through the control tree, calculating weights and assigning page numbers

    分頁時, asp . net循環項樹,計算權重並分配頁
  18. The paper contains all kinds of knowledge related to the system, including maxwell electromagnetic theory, pattern of optical radiation in space, channel model of atmosphere communication, computer communication protocols, wireless lan communication protocols, medium access control protocol, carrier sense multiple access / collision detection protocol, manchester coding theory, pulse position modulation coding theory and so on

    主要包括: maxwell電磁理論;發送光場模型;空間通道模型;計算機網路通信技術:無線局域網通信技術;媒體規程( mac ) ;載波檢測多址接入碰撞檢測規程( csma cd ) ;曼徹斯特編與ppm編技術等。
  19. The control unit, which extracts instructions from memory and decodes and executes them, calling on the alu when necessary

    單元,從內存和代中提取指令並執行他們必須的時候算術邏輯單元。
  20. Code changes for accessing specific items in a listbox control

    listbox項中的特定項的代更改
分享友人