訪問鑒別 的英文怎麼說

中文拼音 [fǎngwènjiànbié]
訪問鑒別 英文
access authentication
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 (鏡子 古代用銅製成) ancient bronze mirror2 (可以作為警戒或引為教訓的事) warning; objec...
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的標識機制增加了新的用戶安全屬性,即安全標簽和審計掩碼,以增加對安全操作系統下強制存取控制和審計機制的支持。
  2. Secure operating system places its focus on controlling user ’ s access to prevent illegal operations, marking the user and authentication to guarantee the security and integrality. access control technology plays an important role to enforce operating system security. now, research on access control in embedded real time operating system ( ertos ) is just at the prime stage

    操作系統安全的主要目標包括根據系統安全策略對用戶的操作進行控制,防止其對計算機資源的非法存取;標識用戶並進行身份;保證操作系統運行的安全性;保證系統自身的安全性和完整性。
  3. Access control is a very important part of the security of operating system. access control is to control the access of objects by the identity of theuser, which is based on the identification and authentication mechanism

    控制是操作系統安全保護中極為重要的一環,它是在標識與的基礎上,根據用戶身份對其提出的資源請求加以控制。
  4. As the number of visitors to hong kong has increased considerably recently, will the government inform this council whether it has put in place special traffic control arrangements at popular tourist spots located in busy urban areas, such as the golden bauhinia square, the peak tower and its vicinity and the sik sik yuen wong tai sin temple, so as to avoid traffic obstructions caused by coaches waiting for and picking up visitors at the roadside

    題:于近日港遊客人數大增,政府可否告知本會,有否在位於鬧市的旅遊熱點(例如金紫荊廣場、山頂凌霄閣一帶及嗇色園黃大仙祠)實施特交通管制措施,以免觀光車輛在路旁等候和接載遊客時造成交通阻塞?
  5. What ' s more, with fundamental research, the following solutions were put forward : database connectivity technology, which can help to implement this system which works in client / server mode, the way of using ole ( object linking and embedding ) to solve the storage and retrieval problems of blob ( binary large object block ) data type and the method of directly giving the database system ' s operating purviews to right users with the application of dbms ' s authentication mechanism, which help to control database ' s access

    這些關鍵技術包括數據庫連接技術,以實現客戶/服務器模式下的數據庫開發;用ole技術解決大文本數據存取題;結合dbms自身機制,將數據庫系統權限賦予用戶,以控制用戶對數據的。最後,本文對南京物流公司管理信息系統的開發工作進行了總結,並展望了開發運輸類公司mis的發展方向。
  6. Using taylor ' s job analysis approach for reference, this thesis disassembles work positions into basic job elements with paq and on these grounds carries on the positivistic study on the characteristics of knowledge work. this is the innovation point, and also is the foundation studied further of this thesis

    本文從借泰勒的工作分析法著手,運用paq工作分析卷將工作崗位分解成若干基本的構成要素,稱之為工作元素,通過卷調查、個談來獲取這些微觀的工作元素所蘊含的信息,從而對知識工作進行特徵分析。
  7. Comparing with iso7489 - 2, aiming at the hidden troubles of the distributed 3 - tiers architecture, we redefine the security services of x - pdm into 4 classes, which are authentication, access control, data security and anti - repudiation

    作者以iso7489 - 2為基礎,針對分散式三層結構的安全隱患,將x - pdm的安全服務類重新描述為控制、數據安全、抗否認等4類。
分享友人