訪問控制器 的英文怎麼說

中文拼音 [fǎngwènkòngzhì]
訪問控制器 英文
access controller
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制器 : controller; regulator; monitor; pilot; keyer; manipulator; control unit; control device; [自動化]...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. Cebus - eib router medium access control sublayer

    Cebus - eib路由媒體子層
  2. So the clients are no longer just browsers ; they are web services clients that interact with application services across administrative domains, and those application services can then call back to the shibboleth services of the client to obtain attributes that can be used for the access control authorization requirements

    因此,客戶機不僅僅是瀏覽;它們包括web服務客戶機,可以與跨管理域的應用服務進行交互,這些應用服務然後可以回調客戶機的shibboleth服務,從而獲取可用於授權需求的屬性。
  3. The net result is that the eight groups of six bits are transformed into eight groups of four bits the four - bit outputs from the s boxes for 32 bits total. the final stage in the calculation of f is to do a permutation p of the s - box output to obtain the final value of f

    該服務的se linux實現定義了一種混合的安全性策略,由類型實施( te ) 、基於角色的( rbac )和可選的多級別安全性( mls )組成,所以廣泛用於軍事安全性中。
  4. Freshly format the second partition ; do not change the default access control list on the root of the drive

    全面格式化第二個分區;不要更改驅動根目錄下的默認列表。
  5. These measures include how a user to log in manufacturing application system under web pages, how to control the resource access on the same web page, how to control the divulgence of the anchor link information of the hyperlink and how to control browser bookmark function ' s access to old pages

    ( 3 )提出了基於web頁面方式的製造應用系統用戶界面下,用戶的安全登錄、對同一個頁面上的資源進行超鏈接錨點鏈接信息的泄漏、瀏覽書簽功能對頁面的等頁面資源安全措施。
  6. View the access control list for a key container

    查看密鑰容列表( acl ) 。
  7. Change the access control list for a key container

    更改密鑰容列表( acl ) 。
  8. The r - gss model is composed of three components as follows : access control decision server ( acds ), ldap directory service server and access control execution server ( aces )

    利用域管理,簡化了rbac模型的實現難度。整個系統包括三個部分:決策子系統、 ldap目錄服務實施子系統。
  9. On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter

    在核心服務方面,通過擴展簡單對象協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的日誌處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機,實現了基於http請求/響應模型的傳輸適配;在服務適配方面,討論了兩種服務的封裝機:運行時封裝機與工廠方法封裝機,結合這兩種機並對服務適配做了實現。
  10. Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on

    基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密碼、條目的添加、刪除、修改、設置組、設置角色和設置等,前臺頁面使用了樹型結構,直觀的反映了目錄服務中數據的拓撲結構。
  11. Current way to access control on web server mostly based on indiviual user, or the simple matrix management, which ca n ' t meet the management needs of large system

    在web服務中,目前多是基於對單個用戶的管理,或簡單的矩陣式管理,無法適應企業級或大系統的管理需求。
  12. The system makes a network security access mechanism suitable for user ' s security policy, including three parts : package filtering router : offering security access control in network layer ; proxy server : used for security access on application layer ; authentication server : used for authentication of user ' s identity

    根據該模型,本文設計了一個防火墻原型系統,該系統提供了一個適合用戶安全策略的網路安全,它由以下三個部分組成:包過濾路由,用來提供網路層一級的安全;代理服務,用來提供應用層一級的;認證服務,用來提供用戶身份認證。
  13. Now the emphasis is transferred to the design and implementation of memory system. before a deep discussing, some basic knowledge is introduced, such as the memory classification and hierarchy, address space, access controlling, cache, memory coherence, and the popular memory system implementation method. then the archteture of the target memory system is presented and divided into two subsystems, the virtual memory management subsystem and memory access subsystem, according to their function

    接下來本文將重點轉移到研究已定目標vliw處理存儲系統的設計和實現,先對存儲系統設計涉及的存儲及其組織層次、地址空間、、 cache 、存儲一致性、常見的實現方式等因素作了分析,然後給出了目標存儲系統的總體框架,並按功能將其劃分為虛存管理和存兩個子系統。
  14. The security environment of the router with ipsec is provided by the cooperation of access control system, key management system, audit system, security service strategy system, intelligent diagnosis system and ipsec implementation

    基於ipsec協議的路由的安全保障由路由中的系統、密鑰管理系統、審計系統、安全服務策略系統、智能診斷系統以及ipsec實現共同提供。
  15. In the following virtual memory management subsystem design, after analyzing the hardware - software dividing line and cooperation in detail, four key issues of virtual memory manage subsystem design are discussed : the classification of processor operating mode, the partition of virtual space, the access controlling and the design of control coprocessor ( ccop ). a virtual manage subsystem prototype is then presented

    在虛存管理子系統設計的討論中,詳細分析了虛存管理中軟硬體的分工協作,深入研究並解決了虛存管理子系統設計的四個核心題:處理工作模式分類、虛地址空間劃分、協處理設計,並在此基礎上給出了一個虛存管理子系統原型。
  16. Accessing style properties in control adapters

    項適配中的樣式屬性
  17. Access control designer is a universal modular tool for visually designing access control policies

    設計是為虛擬設計策略提供的一個通用模塊。
  18. The real address is the “ mac ” ( media access controller ) address hard coded into the device by its manufacturer ( say, 0000c0037df8 for an individual ethernet card )

    真正的地址是mac (媒體訪問控制器)地址,由製造商在設備中編碼(對於一個單獨的以太網卡來說是0000c0037df8 ) 。
  19. The system adopts cisco secure acs ( access control server ) 2. 6 of cisco company as the authentication server, iplanet directory servers. 1 as the directory server and star - s1924f switch based on 802. 1x as the authentication client namely user network access device to implement centralize management of the user account and password and so on in all the application, and the authorization access based on port

    系統採用cisco公司的安全訪問控制器ciscosecureacs ( accesscontrolserver ) 2 . 6作為認證服務, iplanetdirectoryserver5 . 1作為目錄服務,以及實達的基於802 . 1x的交換機star - s1924f作為用戶接入設備即認證客戶端,實現用戶在所有應用的賬號與密碼等相對固定的信息集中管理和基於角色的
  20. To safely manipulate the kernel queue data structures ? that is, in order to ensure thread synchronization ? your code should acquire the appropriate lock ( i. e., resource access control ) first

    為了安全地操作內核隊列數據結構- -換句話說,為了確保線程同步- -你的代碼應當首先獲取合適的鎖(也就是資源訪問控制器) 。
分享友人