訪問控制器 的英文怎麼說
中文拼音 [fǎngwènkòngzhìqì]
訪問控制器
英文
access controller- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 控 : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
- 制 : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
- 器 : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
- 訪問 : visit; call on; interview; access; addressing; reference to
- 控制器 : controller; regulator; monitor; pilot; keyer; manipulator; control unit; control device; [自動化]...
- 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
-
Cebus - eib router medium access control sublayer
Cebus - eib路由器媒體訪問控制子層So the clients are no longer just browsers ; they are web services clients that interact with application services across administrative domains, and those application services can then call back to the shibboleth services of the client to obtain attributes that can be used for the access control authorization requirements
因此,客戶機不僅僅是瀏覽器;它們包括web服務客戶機,可以與跨管理域的應用服務進行交互,這些應用服務然後可以回調客戶機的shibboleth服務,從而獲取可用於訪問控制授權需求的屬性。The net result is that the eight groups of six bits are transformed into eight groups of four bits the four - bit outputs from the s boxes for 32 bits total. the final stage in the calculation of f is to do a permutation p of the s - box output to obtain the final value of f
該服務器的se linux實現定義了一種混合的安全性策略,由類型實施( te ) 、基於角色的訪問控制( rbac )和可選的多級別安全性( mls )組成,所以廣泛用於軍事安全性中。Freshly format the second partition ; do not change the default access control list on the root of the drive
全面格式化第二個分區;不要更改驅動器根目錄下的默認訪問控制列表。These measures include how a user to log in manufacturing application system under web pages, how to control the resource access on the same web page, how to control the divulgence of the anchor link information of the hyperlink and how to control browser bookmark function ' s access to old pages
( 3 )提出了基於web頁面方式的製造應用系統用戶界面下,用戶的安全登錄、對同一個頁面上的資源訪問進行控制、控制超鏈接錨點鏈接信息的泄漏、控制瀏覽器書簽功能對頁面的訪問等頁面資源訪問控制安全措施。View the access control list for a key container
查看密鑰容器的訪問控制列表( acl ) 。Change the access control list for a key container
更改密鑰容器的訪問控制列表( acl ) 。The r - gss model is composed of three components as follows : access control decision server ( acds ), ldap directory service server and access control execution server ( aces )
利用域管理,簡化了rbac模型的實現難度。整個系統包括三個部分:訪問控制決策子系統、 ldap目錄服務器和訪問控制實施子系統。On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter
在核心服務方面,通過擴展簡單對象訪問協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的訪問控制與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的日誌處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機制,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機制:運行時封裝機制與工廠方法封裝機制,結合這兩種機制並對服務適配器做了實現。Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on
基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密碼、條目的添加、刪除、修改、設置組、設置角色和設置訪問控制等,前臺頁面使用了樹型結構,直觀的反映了目錄服務器中數據的拓撲結構。Current way to access control on web server mostly based on indiviual user, or the simple matrix management, which ca n ' t meet the management needs of large system
在web服務器的訪問控制中,目前多是基於對單個用戶的管理,或簡單的矩陣式管理,無法適應企業級或大系統的管理需求。The system makes a network security access mechanism suitable for user ' s security policy, including three parts : package filtering router : offering security access control in network layer ; proxy server : used for security access on application layer ; authentication server : used for authentication of user ' s identity
根據該模型,本文設計了一個防火墻原型系統,該系統提供了一個適合用戶安全策略的網路安全訪問機制,它由以下三個部分組成:包過濾路由器,用來提供網路層一級的安全訪問機制;代理服務器,用來提供應用層一級的訪問控制機制;認證服務器,用來提供用戶身份認證。Now the emphasis is transferred to the design and implementation of memory system. before a deep discussing, some basic knowledge is introduced, such as the memory classification and hierarchy, address space, access controlling, cache, memory coherence, and the popular memory system implementation method. then the archteture of the target memory system is presented and divided into two subsystems, the virtual memory management subsystem and memory access subsystem, according to their function
接下來本文將重點轉移到研究已定目標vliw處理器存儲系統的設計和實現,先對存儲系統設計涉及的存儲器及其組織層次、地址空間、訪問控制、 cache 、存儲一致性、常見的實現方式等因素作了分析,然後給出了目標存儲系統的總體框架,並按功能將其劃分為虛存管理和訪存兩個子系統。The security environment of the router with ipsec is provided by the cooperation of access control system, key management system, audit system, security service strategy system, intelligent diagnosis system and ipsec implementation
基於ipsec協議的路由器的安全保障由路由器中的訪問控制系統、密鑰管理系統、審計系統、安全服務策略系統、智能診斷系統以及ipsec實現共同提供。In the following virtual memory management subsystem design, after analyzing the hardware - software dividing line and cooperation in detail, four key issues of virtual memory manage subsystem design are discussed : the classification of processor operating mode, the partition of virtual space, the access controlling and the design of control coprocessor ( ccop ). a virtual manage subsystem prototype is then presented
在虛存管理子系統設計的討論中,詳細分析了虛存管理中軟硬體的分工協作,深入研究並解決了虛存管理子系統設計的四個核心問題:處理器工作模式分類、虛地址空間劃分、訪問控制和控制協處理器設計,並在此基礎上給出了一個虛存管理子系統原型。Accessing style properties in control adapters
訪問控制項適配器中的樣式屬性Access control designer is a universal modular tool for visually designing access control policies
訪問控制設計器是為虛擬設計訪問控制策略提供的一個通用模塊。The real address is the “ mac ” ( media access controller ) address hard coded into the device by its manufacturer ( say, 0000c0037df8 for an individual ethernet card )
真正的地址是mac (媒體訪問控制器)地址,由製造商在設備中編碼(對於一個單獨的以太網卡來說是0000c0037df8 ) 。The system adopts cisco secure acs ( access control server ) 2. 6 of cisco company as the authentication server, iplanet directory servers. 1 as the directory server and star - s1924f switch based on 802. 1x as the authentication client namely user network access device to implement centralize management of the user account and password and so on in all the application, and the authorization access based on port
系統採用cisco公司的安全訪問控制器ciscosecureacs ( accesscontrolserver ) 2 . 6作為認證服務器, iplanetdirectoryserver5 . 1作為目錄服務器,以及實達的基於802 . 1x的交換機star - s1924f作為用戶接入設備即認證客戶端,實現用戶在所有應用的賬號與密碼等相對固定的信息集中管理和基於角色的訪問控制。To safely manipulate the kernel queue data structures ? that is, in order to ensure thread synchronization ? your code should acquire the appropriate lock ( i. e., resource access control ) first
為了安全地操作內核隊列數據結構- -換句話說,為了確保線程同步- -你的代碼應當首先獲取合適的鎖(也就是資源訪問控制器) 。分享友人