訪問控制域 的英文怎麼說

中文拼音 [fǎngwènkòngzhì]
訪問控制域 英文
access control field
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : 名詞(在一定疆界內的地方; 疆域) land within certain boundaries; territory; region
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. So the clients are no longer just browsers ; they are web services clients that interact with application services across administrative domains, and those application services can then call back to the shibboleth services of the client to obtain attributes that can be used for the access control authorization requirements

    因此,客戶機不僅僅是瀏覽器;它們包括web服務客戶機,可以與跨管理的應用服務進行交互,這些應用服務然後可以回調客戶機的shibboleth服務,從而獲取可用於授權需求的屬性。
  2. The r - gss model is composed of three components as follows : access control decision server ( acds ), ldap directory service server and access control execution server ( aces )

    利用管理,簡化了rbac模型的實現難度。整個系統包括三個部分:決策子系統、 ldap目錄服務器和實施子系統。
  3. Because the existing data model can ’ t work perfectly with given application, this paper brings forward domain data model ( ddm ). ddm ’ s structure is more fit for given applied field. it helps us to design and develop mis easily and it can solve the problem of data access control on applied layer

    本文針對現有的數據模型與具體的應用結合不緊密的特點,提出了構造更貼近具體應用領數據模型,用於幫助mis的設計和開發,解決mis開發過程中,應用層面的數據的難題。
  4. Mac 5ghz supplement to standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - part 11 : wireless lan medium access control and physical layer specifications : high speed physical layer in the 5 ghz band

    信息技術補充標準.系統間電信和信息交換.局網和城網.特殊要求.第11部分:無線lan媒體
  5. Manual configuration of large amount of distributed firewalls, as the access control enforcement points, can not meet the global security requirements in the open and dynamic environment, and make such burden to the administrator ; a variety of multiple clients may need different restricted access rules according to their requirements of quite different security levels, and these rules need to be generated centralized

    作為實施點的每個客戶端網卡,如果採用人工配置,不僅會導致龐大的工作量而且不能滿足整個動態局網的安全要求;網路上各個客戶端的安全級別不同,所以不同用戶的安全策略規則需要集中定。
  6. It have the prime reference utility not only to application field in the bank but also to other one

    不僅適用於銀行應用領,而且對其他應用領中的授權與也具有很強的參考價值。
  7. The paper contains all kinds of knowledge related to the system, including maxwell electromagnetic theory, pattern of optical radiation in space, channel model of atmosphere communication, computer communication protocols, wireless lan communication protocols, medium access control protocol, carrier sense multiple access / collision detection protocol, manchester coding theory, pulse position modulation coding theory and so on

    主要包括: maxwell電磁理論;發送光場模型;空間通道模型;計算機網路通信技術:無線局網通信技術;媒體規程( mac ) ;載波檢測多址接入碰撞檢測規程( csma cd ) ;曼徹斯特編碼與ppm編碼技術等。
  8. Access control model of 2 - d spatial region based on spatial index

    基於空間索引的二維空間區模型
  9. Aim at the characters of spatial data access control, the concept of spatial region access control based on spatial index was proposed

    摘要針對空間數據的的特點,提出了基於空間索引的區概念。
  10. On the realization of unisiting control strategy of lan by using java programs

    小程序實現局網的策略
  11. Mac local area networks - media access control bridges

    網路.媒體
  12. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫策略,以及xml的專有策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的模型x - rbac ,同時為了區分xml數據庫中的合法和合理,我們根據數據庫具有頻繁性這一特徵,提出了一種基於區密度的入侵檢測模型( ids ) ,以對隱藏在正常中的潛在安全威脅進行報警和日誌。
  13. ". the use of individual mac addresses with eapol permits the use of eapol in shared media lan environments, and, in particular, this has been allowed in order to support the use of port - based network access control in ieee 802. 11 wireless lan infrastructures

    「將個體mac地址與eapol ( 7 . 8 )一起使用,可以允許在共享媒體局網環境中使用eapol ,而且特別是它已經過允許,以便支持在ieee 802 . 11無線局網基礎結構中使用基於埠的網路
  14. For the above reason, new security mechanism for wlan is necessary to make sure the data in transmission confidential, complete and undeniable. at the same time, it should provide identity certification and access control. the 802. 1x fulfils all the above requirements, which provides an upgraded certification and authentication method for controlling lan users ’ access through port - based certification

    然而常規的無線局網安全措施如wep等都已被證明不再安全,人們已經認識到必須專門為wlan設計新的安全防護機,以保護在wlan中傳輸數據的機密性、完整性和不可否認性,同時對請求接入wlan的用戶進行身份認證和
  15. Nevertheless, some traditional approaches, such as discretionary access control and mandatory access control, are not suitable for systems where more sophisticated access control is needed. as a result, rbac has become a hotspot in research community in recent years

    然而,傳統的技術? ?自主型和強,遠遠落後于當代系統安全的需求,基於角色的( role - basedaccesscontrol ,簡稱rbac )作為一種新型的技術成為了近年來相關領研究的熱點。
  16. It has functions as follow : address resolution, access control, id verifying, bandwidth control, safety examination, domain management, call control signalling and call management etc. in order to cooperate with tcs, intelligent terminal is developed

    它能提供基於h . 323協議下很重要的功能,例如提供地址解析、、身份驗證、帶寬、安全檢查、的管理、呼叫信令以及呼叫管理等。
  17. In access control apopular form of knowledge test for access control. a password is a string of alphanumeric data or a phrase that must be entered int o a system to gain access to a physical area or a resource

    存取中一種測試權的常見方式,口令是由字母和數字組成的字元串或短語,它們必須輸入系統以獲得某一實際區或資源的使用權限。
  18. The main work of the dissertation is as follows : 1. the mac protocols and media access control protocols of wlan ieee 802. 11b are studied

    本文的主要工作包括: 1 .分析了無線局網ieee802 . 11b的媒體( mac )層協議和工作方式。
  19. Security on secret information network system is different from the general information network. after doing the abundant investigation to x institute information network system, a solution on its system physics safe, network operation security, information safe and secret and safe and secret management, etc. has been designed according to the safety engineering. the designed scheme for the x institute has passed the evaluation of " the national weaponry secret qualification of production unit of scientific research examine authentication "

    根據涉密信息網路對安全的特殊性,根據國家對涉密信息網路安全的相關規范,筆者對x所的信息網路系統進行了充分的調查,以及系統脆弱性和風險分析后,按照信息系統安全工程的方法設計了針對該所整個信息網路系統物理安全、網路運行安全、信息安全保密以及安全保密管理等方面的解決方案,完成了網路安全劃分、防電磁泄漏、安全審計、網路安全管理、信息傳輸加密和等工作。
  20. Mac : amendment to standard for information technology - telecommunications and information exchange between systems - local and metropolitan area networks - specific requirements - part 11 : wireless lan medium access control and physical layer specifications : medium access control security enhancements

    對信息技術標準的修改.系統間的遠程通信和信息交換.局網和城網.特定要求.第11部分:無線局網媒體
分享友人