訪問令牌 的英文怎麼說

中文拼音 [fǎngwènlìngpái]
訪問令牌 英文
acce token
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 名詞1 (牌子,用做提示、獎勵、憑證等的東西) plate; tablet; board; placard 2 (牌子 商品的專用名...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. A service of the data link level ( logical link control ) in ibm ' s token - passing ring

    一種ibm環介質控製法中數據鏈路級(邏輯鏈路控制)業務。
  2. From the forum factory, get a forum. if the permissions of the authorization token don t match the permissions set on the forum, an exception is thrown and the user can t access the forum

    從論壇工廠創建一個論壇,如果授權的許可和論壇的許可集不匹配,將拋出一個異常,而且用戶不能論壇。
  3. Will make future processes aware that a process has a session open and will lock out certain function calls, if they need exclusive access to the given token

    將告知后來的進程已有一個會話打開並將鎖定特定的函數調用,如果它們需要獨佔地給定的話。
  4. Token and token passing access methods

    傳遞方式
  5. The authorization token passed to the forum factory determines with what permissions the rest of the objects in the system will be accessed ; because the administration authorization token is used, all jive objects will be accessed with full permission

    傳遞給論壇工廠的授權決定所創建的對象在系統中的等級;由於利用了管理員授權,因此可以完全所有的jive對象。
  6. As token ring has dual rings, it displays better fault - tolerant capacity than that of bus architecture. employing tokens to pass protocols, token ring is once again a better choice as compared with bus using csmaicd in real time

    環形網具有獨特的雙環設計比總線結構有更好的容錯性;而採用傳遞協議又使其在實時性上優于採用載波偵聽多路技術的以太網。
  7. Each administrative elevation is also process specific, which prevents other processes from using the access token without prompting the user for approval

    每次管理員提升之間也是進程分離的,可以阻止其它進程在沒有得到用戶批準的情況下使用訪問令牌
  8. This fixed memory allotment for token management gives applications easier access to token state information and helps ensure conformance with the pkcs 11 specification

    這塊為管理分配的固定內存使得應用程序更容易地訪問令牌狀態信息並確保和pkcs # 11規范的一致性。
  9. As a result, administrator users have more granular control on what applications install while greatly impacting malicious software that expects the logged on user to be running with a full administrator access token

    這樣,管理員用戶對于應用程序的安裝就有更粒度化的控制,同時對那些期望登錄用戶使用完整的管理員訪問令牌運行的惡意軟體造成了極大的沖擊。
  10. To retrieve the location information longitude and latitude, the service requester first has to retrieve a

    的服務,以此獲得一個來作為獲得arcweb服務的身份確認。
  11. Local and metropolitan area networks ; token - passing bus access method ; identical with iso iec 8802 - 4 : 1990

    局域網和城域網.傳遞總線方法
  12. This protocol is based on current hardware foundation of ethernet and solves access conflict through token - control by creating virtual token on application layer

    該協議基於現有的以太網硬體基礎,在應用層構造虛擬,利用控制來解決網路的沖突題。
  13. The structure of the system can be adjusted dynamically. the more important is that it makes full use of network bandwidth. it controls the use of network resource through token - control, decreases resource waste causing by access conflict in ethernet communication and achieves high - speed real - time data transmission

    基於虛擬和以太網的實時網路協議一方面為上層調用軟體提供了一個透明的可動態調整系統結構的數據傳輸體系,更重要的是它充分利用了網路帶寬,以方式控制網路資源的使用,降低了以太網通信中沖突引發的資源浪費,從而實現了實時高速的網路數據傳輸。
  14. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
  15. The use of integrated security to access external data sources poses a special concern for report users who may not know that their security token is being passed to an external data source users are not warned in advance of running a report that the report is configured to use integrated security

    對于那些可能不知道其安全將傳遞到外部數據源的用戶,使用集成安全性外部數據源會為其帶來一個特殊題(在運行報表之前不會事先通知用戶報表配置為使用集成安全性) 。
  16. Option, the report server passes the security token of the user accessing the report to the server hosting the external data source

    選項時,報表服務器會將報表的用戶的安全傳遞給外部數據源所在的服務器。
分享友人