訪問控制令牌 的英文怎麼說

中文拼音 [fǎngwènkòngzhìlìngpái]
訪問控制令牌 英文
access control token
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : 名詞1 (牌子,用做提示、獎勵、憑證等的東西) plate; tablet; board; placard 2 (牌子 商品的專用名...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. A service of the data link level ( logical link control ) in ibm ' s token - passing ring

    一種ibm環介質製法中數據鏈路級(邏輯鏈路)業務。
  2. As a result, administrator users have more granular control on what applications install while greatly impacting malicious software that expects the logged on user to be running with a full administrator access token

    這樣,管理員用戶對于應用程序的安裝就有更粒度化的,同時對那些期望登錄用戶使用完整的管理員運行的惡意軟體造成了極大的沖擊。
  3. This protocol is based on current hardware foundation of ethernet and solves access conflict through token - control by creating virtual token on application layer

    該協議基於現有的以太網硬體基礎,在應用層構造虛擬,利用來解決網路的沖突題。
  4. The structure of the system can be adjusted dynamically. the more important is that it makes full use of network bandwidth. it controls the use of network resource through token - control, decreases resource waste causing by access conflict in ethernet communication and achieves high - speed real - time data transmission

    基於虛擬和以太網的實時網路協議一方面為上層調用軟體提供了一個透明的可動態調整系統結構的數據傳輸體系,更重要的是它充分利用了網路帶寬,以方式網路資源的使用,降低了以太網通信中沖突引發的資源浪費,從而實現了實時高速的網路數據傳輸。
  5. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
分享友人