邏輯訪問控制 的英文怎麼說

中文拼音 [luófǎngwènkòngzhì]
邏輯訪問控制 英文
logical access control
  • : Ⅰ動1. (巡察) patrol 2. [書面語] (遮攔) blockⅡ名詞1. (巡察) patrol 2. [書面語] (山溪的邊緣) edge
  • : Ⅰ動詞(編輯; 輯錄) collect; compile; edit Ⅱ名詞(整套書籍、資料的各個部分) part; volume; division
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 邏輯 : logic
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. A service of the data link level ( logical link control ) in ibm ' s token - passing ring

    一種ibm令牌環介質製法中數據鏈路級(鏈路)業務。
  2. Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic

    以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:數據鏈路層和物理層,並將其細分為一些功能子層,包括數據鏈路層的llc (鏈路)子層和mac (介質)子層,物理層的pcs (物理編碼子層) 、 pma (物理介質附加子層)和pmd廈門大學碩士學位論文摘要(物理介質相關于層) 。
  3. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban形式分析和論證,結果表明該協議是安全的;改進后的方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要權限遞增假設下,實現了用戶對文件的多種權限,並大大減小了溢出題的發生可能
  4. The control unit, which extracts instructions from memory and decodes and executes them, calling on the alu when necessary

    單元,從內存和代碼中提取指令並執行他們必須的時候算術單元。
  5. If the technicians applied technology in the wrong, even achieving the business logic, but probably leading to many vices including low performance, low scalability, close coupling, low software duplication. so how to assemble the j2ee technology reasonable and achieve a system with high performance and high expansibility is my research emphasis in the thesis. in order to solve the problems and implement efficient web application, the paper put forward ejs _ mvc model according mvc pattern and we can assemble component by using ejs _ mvc model, it can solve many problems of web application and improving system with clear flow and clear function partition, in addition, due to controller is the most importance in the ejs _ mvc model, so the thesis also discuss some problems about controller design ; if the model is not designed accurately, system performance will encounter fatal influence, so the article lucubrate ejb technology from ejb choice, ejb optimized design, database access, design pattern etc and bring forward some strategies and methods about how to build efficient business tier ; finally based on ejs _ mvc model, a example that contains simple business logic is developed according to the object - orient software engineering thinking and some strategies and methods proposed by the thesis, in the process of achieving system function, the emphasis is probing into how t o assemble and apply technology reasonable and providing a new thinking thread and method contributing to build high effective and flexible j2ee application

    由於j2eeweb應用是由組件組成,因此為了解決上述題,實現高效的應用,本文首先從如何合理組合組件入手,找到一種方法使各組件能具體分工而又緊密合作,在深入研究各組件基礎上,根據mvc模提出了ejs _ mvc模型概念,指出可按此模型組合各層組件,該模型可以解決傳統web開發中存在的題,而且具有系統流程與系統功能劃分清晰,可擴展性、可維護性強等優點,另外由於器是ejsmvc模型的重中之重,它起到承上啟下的作用,它設計好壞直接關繫到整個應用的性能、伸縮性與擴展性,因此又探討了器設計的有關題;另外如果模型設計不當的話,對系統性能造成的影響可能是致命的,因此本文又從ejb組件選擇、 ejb調優設計、數據庫和設計模式等方面對ejb技術作了全面的分析研究,指出在業務層中如何避免太多網路遠程調用和提高業務層性能,特別是根據前面的分析總結出了業務層的優化分層組合模型,這個模型的使用無疑會使業務層具有較高的性能與伸縮性;最後選擇一個業務較簡單的系統,使注意力集中到運用的j2ee技術上來,按照ejs _ mvc模型與軟體工程流程以及本論文所提出的方法與策略實現業務,在實現過程中具體探討如何合理運用組合技術,就多層j2ee體系結構的設計思想作深入的探討實踐,為實現高效、靈活的多層j2ee應用提供一種新的思路及方法。
  6. Msil includes instructions for loading, storing, initializing, and calling methods on objects, as well as instructions for arithmetic and logical operations, control flow, direct memory access, exception handling, and other operations

    Msil包括用於加載、存儲和初始化對象以及對對象調用方法的指令,還包括用於算術和運算、流、直接內存、異常處理和其他操作的指令。
  7. This logic especially makes sense in scenarios with many updates of the access control configuration

    這種對于大量更新配置的情況特別有用。
  8. As is stated above, this thesis did research on struts, spring and hibernate frameworks, and analysed each framework ’ s function in web application layer. an architecture is integrated with the three frameworks which is suitable for enterprise web application. the architecture hands business logic of struts to spring ; utilize beans configuration to manage the related classes ; manage objects ’ relation of between controller and data access object through spring and make data persistence by hibernate. this thesis made did deep analysis and research on coupling of integration between spring and struts and put forward a solution to loose coupling of integration

    本文針對上述題,對struts , spring , hibernate框架進行研究,具體分析各個框架在web應用的不同層次上所發揮的作用,並整合三種框架,設計出一個適合企業web應用的java通用架構,即將struts應用中的業務交給spring管理,相關類用spring的beans配置完成,由spring管理與表現層的器及更下層的數據對象( dataaccessobject )對象的關系,由hibernate負責數據的持久化;並對spring和struts整合的耦合性進行深入的分析研究,提出了一種框架整合的解耦方案;採用aop ( aspectorientedprogramming )機,設計出一個脫離spring環境的aop ;最後用一個實際的項目對架構應用進行實現。
  9. The thesis use role based access control model, design a set of logical data model and propose the basic algorithm for access database

    在數據方面採用了基於角色的安全策略,設計了數據模型和基本方法。
  10. Under the open internet environment, three security mechanisms, including data confidentiality, identity authentication, and access control mechanism, must be realize when constructing logic secure subnet

    在開放的網際網路絡中,構建安全子網必須要實現三種安全機:數據保密性機、身份認證機
分享友人