訪問控制字 的英文怎麼說

中文拼音 [fǎngwènkòngzhì]
訪問控制字 英文
access control word
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The on - line isotope dew point measurer control scheme

    應用數證書實現基於角色的
  2. The network information and control exchange ( nice ) protocol that enables various digital computers to access information and control facilities of remote nodes on the same network

    網路信息和交換系統協議,能使各種數式計算機同一網路中遠程網點的信息和設備。
  3. Functions were added to allow access to and control of the floating point control word on both the x87 and sse2 floating point processor

    函數,以允許對x87和sse2浮點處理器上的浮點的進行
  4. On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter

    在核心服務方面,通過擴展簡單對象協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的與基於usbkey盤的soap消息的數簽名與加密的實現、基於分級的日誌處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機:運行時封裝機與工廠方法封裝機,結合這兩種機並對服務適配器做了實現。
  5. The second one is how can we capture the data just before they are sent out or received in. the third one is how can we inform our monitor or debugger process this event, transfer the data to the monitor or debugger, and get the results back. as far as microsoft windows operation system is concerned, which mostly has been installed on personal computers and partly server cmputers, softwares access data in internet through windows socket application program interface

    就被廣泛安裝在個人計算機和一部分服務計算機的微軟視窗操作系統而言,軟體通常通過操作系統提供的套接網路介面網路數據,在視窗操作系統上有兩套網路介面,一是由伯克勒大學設計,被稱之為bsd套接的介面,由阻塞同步和非阻塞異步以及輪循機輸入和輸出工作;另一套是微軟公司開發的窗口套接,由網路消息事件驅動。
  6. This system ' s hardware adopts dsp - embedded controller, which can process digital signal independently. the controller communicates with pc by accessing memory. on the side of controller, c language is used to write the interpolation program and the interruption service program, while on the side of pc, visual c + + is used to write programs in which functions of editing nc - code, real - time control and human - machine interaction interface is fulfilled

    該數系統的硬體採用了具有獨立數信號處理功能的dsp型運動器,器通過內存與pc機通信,使用c語言編寫了器端的中斷服務和插補程序,使用visualc + +編寫了pc端的數代碼編輯、實時和人機交互界面程序。
  7. It provides fine grained access control, using a local name space hierarchy, and a simple, flexible, trust policy model ; these features allow for the ability to create groups and delegate authorizations. finally, it is proposed that an spki certificate based payment system that offered a

    Spki / sdsi為使用者提供了細粒度的手段,它使用局部名空間和一個簡單、靈活的信任策略模式,這些特性使得可以創建組結構和進行授權代理。
  8. In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system

    論文中對鐵路信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統安全中有關框架及機的相關理論設計並實現了鐵路信息系統安全框架中的數證書( pki ca )及用戶目錄管理( ldap )系統、網路代理和認證授權機、基於pki ca的身份認證和授權系統及應用系統安全框架和支持平臺。
  9. When you define an access key in a label control, the user can press the alt key plus the character you designate to move the focus to the control that follows it in the tab order

    在標簽( label )項中定義鍵時,用戶可以按alt鍵和指定元將焦點移動到tab鍵順序中的下一個項上。
  10. A string of printable characters intended to be used as a key of some sort in controlling access to files or systems

    打算在對文件或系統時作為某類密鑰使用的一種可列印元串。
  11. Access key is an underlined character in the text of a menu, menu item, or the label of a control such as a button

    鍵」是菜單菜單項或項如按鈕標簽的文本中帶下劃線的元。
  12. An access key, also known as a mnemonic, is an underlined character in the text of a menu, menu item, label of a button, or some other control

    鍵(也稱助記鍵)是菜單、菜單項、按鈕標簽或其他某項的文本中帶下劃線的元。
  13. The insecurity of the double - way authentication access control scheme based on harn ' s digital signature is analyzed in charpter five

    詳細分析了基於harn數簽名的雙向認證方案的安全漏洞,並對原方案做了改進。
  14. To overcome the shortcoming of the double - way authentication access control scheme based on harn ' s digital signature, a new double - way authentication protocol is proposed to improve the old one. a new single - key - lock - pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital

    針對基於harn數簽名雙向認證實現方案中所存在的題,運用密碼技術改進了原方案的雙向認證協議,並作為對原方案的改進,基於整數二進製表示的唯一性,提出了一種新的單鑰-鎖對方案。
  15. Research on access control of digital television management system based on rbac model

    模型的數電視管理系統的研究
  16. In access control apopular form of knowledge test for access control. a password is a string of alphanumeric data or a phrase that must be entered int o a system to gain access to a physical area or a resource

    存取中一種測試權的常見方式,口令是由母和數組成的元串或短語,它們必須輸入系統以獲得某一實際區域或資源的使用權限。
  17. Provides a managed implementation of the windows sockets winsock interface for developers who need to help control access to the network

    為需要幫助網路的開發人員提供windows套接( winsock )介面的託管實現。
  18. Provides a managed implementation of the windows sockets winsock interface for developers who need to tightly control access to the network

    -為需要嚴格網路的開發人員提供windows套接winsock介面的託管實現。
  19. Initializes a new instance of the mutex class with a boolean value that indicates whether the calling thread should have initial ownership of the mutex, a string that is the name of the mutex, a boolean variable that, when the method returns, indicates whether the calling thread was granted initial ownership of the mutex, and the access control security to be applied to the named mutex

    使用一個指示調用線程是否應擁有互斥體的初始所屬權的布爾值、一個作為互斥體名稱的元串、一個在方法返回時指示調用線程是否被授予互斥體的初始所屬權的布爾變量、以及要應用於已命名的互斥體的安全性來初始化
  20. This paper mainly introduces the application of rbac - based access control mechanism in library so as to provide some reference for digital library construction

    文中主要介紹了基於rbac技術的在數圖書館中的應用,擬對現代數圖書館的建設有所貢獻。
分享友人