訪問控制字 的英文怎麼說
中文拼音 [fǎngwènkòngzhìzì]
訪問控制字
英文
access control word- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 控 : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
- 制 : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
- 字 : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
- 訪問 : visit; call on; interview; access; addressing; reference to
- 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
-
The on - line isotope dew point measurer control scheme
應用數字證書實現基於角色的訪問控制The network information and control exchange ( nice ) protocol that enables various digital computers to access information and control facilities of remote nodes on the same network
網路信息和控制交換系統協議,能使各種數字式計算機訪問同一網路中遠程網點的信息和控制設備。Functions were added to allow access to and control of the floating point control word on both the x87 and sse2 floating point processor
函數,以允許對x87和sse2浮點處理器上的浮點控制字的進行訪問和控制。On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter
在核心服務方面,通過擴展簡單對象訪問協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的訪問控制與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的日誌處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機制,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機制:運行時封裝機制與工廠方法封裝機制,結合這兩種機制並對服務適配器做了實現。The second one is how can we capture the data just before they are sent out or received in. the third one is how can we inform our monitor or debugger process this event, transfer the data to the monitor or debugger, and get the results back. as far as microsoft windows operation system is concerned, which mostly has been installed on personal computers and partly server cmputers, softwares access data in internet through windows socket application program interface
就被廣泛安裝在個人計算機和一部分服務計算機的微軟視窗操作系統而言,軟體通常通過操作系統提供的套接字網路介面訪問網路數據,在視窗操作系統上有兩套網路介面,一是由伯克勒大學設計,被稱之為bsd套接字的介面,由阻塞同步和非阻塞異步以及輪循機制控制輸入和輸出工作;另一套是微軟公司開發的窗口套接字,由網路消息事件驅動。This system ' s hardware adopts dsp - embedded controller, which can process digital signal independently. the controller communicates with pc by accessing memory. on the side of controller, c language is used to write the interpolation program and the interruption service program, while on the side of pc, visual c + + is used to write programs in which functions of editing nc - code, real - time control and human - machine interaction interface is fulfilled
該數控系統的硬體採用了具有獨立數字信號處理功能的dsp型運動控制器,控制器通過內存訪問與pc機通信,使用c語言編寫了控制器端的中斷服務和插補程序,使用visualc + +編寫了pc端的數控代碼編輯、實時控制和人機交互界面程序。It provides fine grained access control, using a local name space hierarchy, and a simple, flexible, trust policy model ; these features allow for the ability to create groups and delegate authorizations. finally, it is proposed that an spki certificate based payment system that offered a
Spki / sdsi為使用者提供了細粒度的訪問控制手段,它使用局部名字空間和一個簡單、靈活的信任策略模式,這些特性使得可以創建組結構和進行授權代理。In the article, the author gives out the current status of the information system, sums up the security requirements and the purpose of the project. based on the theory of access control, the author gives out the solutions for the pki / ca infrastructure, network access proxy mechanism, authentication and authorization mechanism and the security architecture for the application system
論文中對鐵路信息系統現狀進行了分析,歸納出明確的需求及目標,並依據信息系統安全中有關訪問控制框架及機制的相關理論設計並實現了鐵路信息系統安全框架中的數字證書( pki ca )及用戶目錄管理( ldap )系統、網路訪問代理和認證授權機制、基於pki ca的身份認證和授權系統及應用系統安全框架和支持平臺。When you define an access key in a label control, the user can press the alt key plus the character you designate to move the focus to the control that follows it in the tab order
在標簽( label )控制項中定義訪問鍵時,用戶可以按alt鍵和指定字元將焦點移動到tab鍵順序中的下一個控制項上。A string of printable characters intended to be used as a key of some sort in controlling access to files or systems
打算在控制對文件或系統訪問時作為某類密鑰使用的一種可列印字元串。Access key is an underlined character in the text of a menu, menu item, or the label of a control such as a button
「訪問鍵」是菜單菜單項或控制項如按鈕標簽的文本中帶下劃線的字元。An access key, also known as a mnemonic, is an underlined character in the text of a menu, menu item, label of a button, or some other control
訪問鍵(也稱助記鍵)是菜單、菜單項、按鈕標簽或其他某控制項的文本中帶下劃線的字元。The insecurity of the double - way authentication access control scheme based on harn ' s digital signature is analyzed in charpter five
詳細分析了基於harn數字簽名的雙向認證訪問控制方案的安全漏洞,並對原方案做了改進。To overcome the shortcoming of the double - way authentication access control scheme based on harn ' s digital signature, a new double - way authentication protocol is proposed to improve the old one. a new single - key - lock - pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital
針對基於harn數字簽名雙向認證訪問控制實現方案中所存在的問題,運用密碼技術改進了原方案的雙向認證協議,並作為對原訪問控制方案的改進,基於整數二進製表示的唯一性,提出了一種新的單鑰-鎖對訪問控制方案。Research on access control of digital television management system based on rbac model
模型的數字電視管理系統的訪問控制研究In access control apopular form of knowledge test for access control. a password is a string of alphanumeric data or a phrase that must be entered int o a system to gain access to a physical area or a resource
存取控制中一種測試訪問控制權的常見方式,口令是由字母和數字組成的字元串或短語,它們必須輸入系統以獲得某一實際區域或資源的使用權限。Provides a managed implementation of the windows sockets winsock interface for developers who need to help control access to the network
為需要幫助控制網路訪問的開發人員提供windows套接字( winsock )介面的託管實現。Provides a managed implementation of the windows sockets winsock interface for developers who need to tightly control access to the network
-為需要嚴格控制網路訪問的開發人員提供windows套接字winsock介面的託管實現。Initializes a new instance of the mutex class with a boolean value that indicates whether the calling thread should have initial ownership of the mutex, a string that is the name of the mutex, a boolean variable that, when the method returns, indicates whether the calling thread was granted initial ownership of the mutex, and the access control security to be applied to the named mutex
使用一個指示調用線程是否應擁有互斥體的初始所屬權的布爾值、一個作為互斥體名稱的字元串、一個在方法返回時指示調用線程是否被授予互斥體的初始所屬權的布爾變量、以及要應用於已命名的互斥體的訪問控制安全性來初始化This paper mainly introduces the application of rbac - based access control mechanism in library so as to provide some reference for digital library construction
文中主要介紹了基於rbac技術的訪問控制機制在數字圖書館中的應用,擬對現代數字圖書館的建設有所貢獻。分享友人