訪問策略 的英文怎麼說

中文拼音 [fǎngwènlüè]
訪問策略 英文
access policy
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 (通「冊」 古代寫字用的竹片或木片) bamboo or wooden slips used for writing on in ancient ...
  • : Ⅰ名詞1 (簡單扼要的敘述) summary; outline; brief account; résumé: 節略 memorandum; aide mémoire;...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 策略 : 1 (制定的行動方針和斗爭方式) tactics 2 (講究斗爭藝術) tactful 3 [數學] (對策) policy; strat...
  1. Manual configuration of large amount of distributed firewalls, as the access control enforcement points, can not meet the global security requirements in the open and dynamic environment, and make such burden to the administrator ; a variety of multiple clients may need different restricted access rules according to their requirements of quite different security levels, and these rules need to be generated centralized

    作為控制實施點的每個客戶端網卡,如果採用人工配置,不僅會導致龐大的工作量而且不能滿足整個動態局域網的安全要求;網路上各個客戶端的安全級別不同,所以不同用戶的安全訪問策略規則需要集中制定。
  2. It is responsible for deciphering class files and uploading into java virtual machine ; class verifier is used to the correct internal structure ; security manager is used to customize the access strategy and permission ; and ssl guarantees the data security during transmission. though modeling and testing a prototype system, experiment proved the correctness and efficiency of above design

    類裝載器是java安全體系的第一道防線,它負責將類解密后裝入java虛擬機; class文件檢驗器保證裝載的class文件有正確的內部結構;安全管理器主要用於定製用戶對系統的訪問策略權限;安全套接字用來保證web傳輸安全。
  3. Recommendations for data access strategies

    >數據訪問策略建議
  4. Web page navigation control pertains to the application s access policy

    Web頁瀏覽控制屬于應用程序的訪問策略
  5. The strategy of transparent accessing to enterprise information based on j2ee components

    組件的企業信息安全訪問策略
  6. Specifying access control policies for xml documents with xpath. in proc

    Cschema寫的訪問策略通過一個擴展的確認過程來執行。
  7. You are not allowed to access the requested page based on firewall web access rules

    基於防火墻的網頁訪問策略,你的被拒絕。
  8. Stored credentials are recommended as part of a strategy for accessing remote database servers

    建議將存儲的憑據作為遠程數據庫服務器訪問策略的一部分。
  9. In proc. acm symp. principles of programming languages, long beach, california, 2005, pp. 158 - 170

    2設計了一個內嵌計算的schema語言去表達xml的降級訪問策略
  10. Method can be used to distinguish loading and data access strategy, or any other kind of access properties

    方法把載入和數據訪問策略(或者其他任何類型的屬性)分開。
  11. The following sections provide recommendations for which data - access strategy to use with specific types of applications. windows forms

    下面各節將提供一些建議,這些建議適用於與特定類型應用程序一起使用的數據訪問策略
  12. The strategy of the sdai accessing the relational databases based on working form is described in the paper

    論文對sdai數據庫訪問策略進行了研究,闡述了一種基於內存緩沖方式的sdai數據庫訪問策略? ?內存鏡像sdai數據庫訪問策略
  13. And also, several modules of the human resource management, equipment management, work management, security management and work assistant management are presented in the system analysis & design phase. the analysis & design flow is presented, and the object - oriented idea is used in the development

    在系統分析設計階段,對人事管理、設備管理、生產管理、電量管理、安全管理、生產輔助管理等幾個模塊進行了分析,給出了系統分析設計流程,採用面向對象的思想,進行系統的總體結構、訪問策略、子模塊的設計。
  14. In this security model, mobile agent uses different itinerary patterns, security policies and reputation management to reduce the risk in e - commerce as much as possible and make the transactions of e - commerce more efficient

    在所研究的安全模型中,移動代理使用不同的訪問策略、安全機制以及信用管理措施來盡可能地降低在電子商務環境中所遭受到的風險,同時利用移動特性來提高交易的效率。
  15. This thesis put research emphasis on the shared i / o driver model and access policy in the satellite - carried embedded multiprocessor real - time operating system, in which the processors share a single i / o system

    本文重點研究在多處理器共享i / o的系統中,星載嵌入式多處理器實時操作系統對于共享i / o的訪問策略及驅動模型。
  16. Your access policy must dictate the possible navigation path for a specific user role in order to prevent a malicious user from navigating to a page for example, through bookmarks to which he or she does not have access

    訪問策略必須指定特定用戶角色可能的瀏覽路徑,以防止惡意用戶瀏覽他或她無權瀏覽的某一頁(例如,通過書簽) 。
  17. Finally, it summarizes similarities and differences of c / s and b / s on the sides of system designing, database accessing strategy and system security by combining theory and practice

    最後,結合理論和實踐,就系統設計、數據庫訪問策略、系統安全方面總結了c s模式和b s模式的企業mis的異同點。
  18. Principles of programming languages, portland, oregon, usa, 2002, pp. 307 - 318. 25 peng li, steve zdancewic. downgrading policies and relaxed noninterference

    1提出了xml的降級控制題,它把降級訪問策略的焦點從代碼層轉移到數據層。
  19. Based on the strategy, the accessing functions for all entity types for relational databases are developed. used by the functions, the software can handle the persistency of product data in relational databases. examples show the validity of the research

    基於這種訪問策略,開發了各種類型實體的關系數據庫介面函數,實現了利用這些介面函數對關系數據庫系統中的產品數據進行添加、刪除、修改和查詢等操作。
  20. The combination of the subtree - based storage model with the document - based to ensure the efficiency and integrality of the data retrieval for all sorts of heterogeneous and context mixed data to the fullest extent ; 2. dynamically branching and merging combined with the data mapping mechanism, supports the xml document efficiently and can improve the operation capability of the system to some extent ; 3. referring to the characteristic of xquery, it presents a new operation language for xml data, xqul, which supports the query operation as well as the update operation on xml ; 4

    本文提出了一套較為通用的非結構化信息的nativexml文檔存儲訪問策略和實現方案作為對非結構化信息存取機制研究的探索和嘗試,主要包括下列理論及技術: 1 .基於子樹和基於文檔的存儲模式相結合,以最大程度保證底層各類形式異構和內容混雜的數據存取的有效性和完整性; 2 .動態分枝合成技術和數據映像機制的引入,實現對xml文檔的有效支持,並在一定程度上提高系統處理性能; 3 .結合xquery查詢語言特點,提出一種新型xml數據操作語言xqul ,支持xml數據的查詢以及更新操作; 4 .三種索引(文檔索引、結構索引、值索引)的建立,為xml數據提供從站點到文檔,從文檔到元素的多級訪問策略
分享友人