access control key 中文意思是什麼

access control key 解釋
存取控制關鍵碼
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. 3. in e - government security value orientation through the research government ' s organizational structure, the government movement process, withdraws the government activity which relatively stable role and the task as the key aspect for the access control

    3 .在電子政務安全的價值取向一節中通過研究政府的組織結構、政務的運行過程,提取政務活動中相對穩定的角色和任務作為訪問控制的關鍵因素。
  3. View the access control list for a key container

    查看密鑰容器的訪問控制列表( acl ) 。
  4. Change the access control list for a key container

    更改密鑰容器的訪問控制列表( acl ) 。
  5. This dissertation mainly introduces the key technology and innovative research of ws - dfs, such as web - based architecture, flexible component model, distributed local file storage unit, parallel access control and high efficiently organize and index for huge amount data

    本文主要論述基於web服務的分散式文件服務系統的關鍵技術及創新研究,包括體系結構、靈活的組件模型、全分佈的本地文件存儲單元、數據並發訪問控制和海量數據高效的組織和檢索等六個方面的研究成果。
  6. Operations guide : ! keyboard control key mobile access doors s jump

    操作指南:鍵盤控制方向鍵移動進入門s跳躍
  7. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出問題的發生可能
  8. The security environment of the router with ipsec is provided by the cooperation of access control system, key management system, audit system, security service strategy system, intelligent diagnosis system and ipsec implementation

    基於ipsec協議的路由器的安全保障由路由器中的訪問控制系統、密鑰管理系統、審計系統、安全服務策略系統、智能診斷系統以及ipsec實現共同提供。
  9. Providing a novel access scheme for solving “ last mile ” wideband access and global person communications. in wireless optical code multiple access ( w - ocdma ) network, media access control ( mac ) is a key issue, which determines network performance 、 bandwidth efficiency 、 complexity and cost of terminal

    無線光碼分多址( w - ocdma )接入網中,數據鏈路層的媒質接入控制技術( mac )至關重要,它直接影響網路的性能、帶寬利用效率、終端設備的復雜度和成本。
  10. Control key figures running the space bar entry to the room, a click of the mouse from any suspicious objects access to relevant evidence

    方向鍵控制人物行走,空格鍵進入房間,鼠標點取可疑物獲取相關證據。
  11. This scheme describes the relation of role hierarchy with dag and role ’ s permissions withacm ( access control mask ), solve key technology problems

    該方案採用有向無環圖描述角色的繼承關系,用訪問控制掩碼描述角色的權限,解決了基於角色訪問控制在實現中的關鍵問題。
  12. Secure access control mechanism is key technique that keeps security of subnet, and also the hotspot in the field of network security

    因此,安全的帶雙向認證的訪問控制機制已成為保證子網安全的核心,也是網路安全研究中的熱點。
  13. It analyzes the key factors of human resource modeling, the ways to select resource, the primary strategy base of allocating resources dynamically and the access control model of operating system and database system. because cmm ( capability maturity model ) and rup ( rational unified process ) are too complex to use properly in the small organization, a human resource management model of middle / small software developing organization is proposed. it is based on the cmm and rup model and combined with our working experience

    本文分析了資源管理的要素、分配策略、確定了資源選擇方法和權限管理方式,對人力資源進行建模管理,並參考cmm ( capabilitymaturitymodel )和rup ( rationalunifiedprocess )的資源管理,歸並相關角色,結合作者的工作經驗,提出了一個中小型企業軟體開發人力資源模型,與資源管理模塊配合使用。
  14. The research on multi - privileged access control of group key agreement

    組密鑰協商的多權限訪問控制
  15. The grid application needs to handle any and all requirements for authentication, access control, data integrity, confidentiality of data, and public and private key management

    網格應用程序需要處理所有的認證、訪問控制、數據一致性、數據保密性、公鑰私鑰管理等方面的需求。
  16. To overcome the shortcoming of the double - way authentication access control scheme based on harn ' s digital signature, a new double - way authentication protocol is proposed to improve the old one. a new single - key - lock - pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital

    針對基於harn數字簽名雙向認證訪問控制實現方案中所存在的問題,運用密碼技術改進了原方案的雙向認證協議,並作為對原訪問控制方案的改進,基於整數二進製表示的唯一性,提出了一種新的單鑰-鎖對訪問控制方案。
  17. Within this framework, we design and implement three key components in e - business platform : the distributed data transfer component, the ldap - based access control component and the online payment component

    圍繞這樣的電子商務平臺框架,我們設計並實現了分散式數據交換、基於ldap的訪問控制以及安全支付等三個電子商務平臺關鍵組件。
  18. While public key cryptography addresses issues of data integrity and transaction privacy, certificates address concerns in authentication and access control

    公匙加密技術是解決數據完整及交易保密的問題,而數碼證書則能處理認證及接達控制的問題。
  19. Provides the ability to control access to a cryptographic key object without direct manipulation of an access control list

    提供無需直接操作訪問控制列表( acl )而控制對加密密鑰對象的訪問的能力。
  20. Different people have different access control rights to different resources. how to authenticate and authorize users is the key to build a stable system

    不同的用戶對不同的資源擁有不同的訪問權限,如何對眾多的用戶進行驗證和授權是成功構建系統的一個關鍵。
分享友人