訪問控制碼 的英文怎麼說

中文拼音 [fǎngwènkòngzhì]
訪問控制碼 英文
access control code
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的標識鑒別機增加了新的用戶安全屬性,即安全標簽和審計掩,以增加對安全操作系統下強存取和審計機的支持。
  2. Represents a combination of a user s identity, an access mask, and an access control type allow or deny

    表示用戶的標識、類型(允許或拒絕)的組合。
  3. Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on

    基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密、條目的添加、刪除、修改、設置組、設置角色和設置等,前臺頁面使用了樹型結構,直觀的反映了目錄服務器中數據的拓撲結構。
  4. 2. a comprehensive framework is developed for the above model. those include functional modules, related data structure, frames of message encoding, certificate management database, ring of keys, concrete information flows for access control and so on

    完整設計了模型的整個可實現框架:包括各組成模塊的功能、相關數據結構和消息編格式、證書管理庫和密鑰環的設計,以及具體的流程等。
  5. Ethernet maps the two lowest layers of osi model ( seven - layer module ) : data link layer and physical layer and divides them to some function sublayers including pcs ( physical coding sublayer ), pma ( physical medium attachment ) and pmd ( physical medium depend ) in physical layer. in these sublayers, logical link control ( llc ) is implemented through operation system, nic driver software and medium access control ( mac ) and the physical layer below it are implemented by the nic

    以太網對應了osi開放系統模型( 7層網路模型)的最下兩層:數據鏈路層和物理層,並將其細分為一些功能子層,包括數據鏈路層的llc (邏輯鏈路)子層和mac (介質)子層,物理層的pcs (物理編子層) 、 pma (物理介質附加子層)和pmd廈門大學碩士學位論文摘要(物理介質相關于層) 。
  6. File management has the function of 2 - level password management, including passwords of developers and users. this function allows developer to manage the access right to hardware and issue different access control rights to different users. 1

    檔管理系統具有2級密管理功能,包括開發商口令和用戶口令,開發商可以使用此功能對硬體的許可權進行管理,可以對不同的用戶開放不同的許可權。
  7. Any access control entry with a zero - access mask is removed

    具有零的任何項( ace )將被移除。
  8. Class. when paginating, the asp. net iterates through the control tree, calculating weights and assigning page numbers

    分頁時, asp . net循環項樹,計算權重並分配頁
  9. The paper contains all kinds of knowledge related to the system, including maxwell electromagnetic theory, pattern of optical radiation in space, channel model of atmosphere communication, computer communication protocols, wireless lan communication protocols, medium access control protocol, carrier sense multiple access / collision detection protocol, manchester coding theory, pulse position modulation coding theory and so on

    主要包括: maxwell電磁理論;發送光場模型;空間通道模型;計算機網路通信技術:無線局域網通信技術;媒體規程( mac ) ;載波檢測多址接入碰撞檢測規程( csma cd ) ;曼徹斯特編與ppm編技術等。
  10. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,定了行之有效的規章度。
  11. The following example shows how you can determine the selected check boxes in a

    項中的選定復選框。這段代循環項的
  12. This scheme describes the relation of role hierarchy with dag and role ’ s permissions withacm ( access control mask ), solve key technology problems

    該方案採用有向無環圖描述角色的繼承關系,用描述角色的權限,解決了基於角色在實現中的關鍵題。
  13. The real address is the “ mac ” ( media access controller ) address hard coded into the device by its manufacturer ( say, 0000c0037df8 for an individual ethernet card )

    真正的地址是mac (媒體器)地址,由製造商在設備中編(對於一個單獨的以太網卡來說是0000c0037df8 ) 。
  14. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命令模式的持久層組件,封裝了數據庫細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的代冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的的安全子系統則初步實現了數據安全傳輸和權限;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
  15. The design was based on the security reference model of csss, the architecture of which is a subset of the corba security architecture. lastly, the paper took large efforts to analyze the orb connection management, orb pseudo - object, object reference, and ior for orbit. based on the analysis, the paper implemented the ssl - based security service for orbit by modifying and complementing the orbit source.

    提出設計之後,本文比較詳細地剖析了orbit中的連接管理、 orb偽對象、 orb初始化、對象引用、 ior ,在此基礎上對orbit源作了大量修改、補充,使之支持ssl的嵌入,最終實現通信加密、用戶認證、和審計等安全服務。
  16. Presents platform sdk recommendations about privileges, buffer overruns, discretionary access control lists dacls, and passwords

    介紹有關的platform sdk建議,包括特權、緩沖區溢出、任意列表( dacl )和密
  17. To overcome the shortcoming of the double - way authentication access control scheme based on harn ' s digital signature, a new double - way authentication protocol is proposed to improve the old one. a new single - key - lock - pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital

    針對基於harn數字簽名雙向認證實現方案中所存在的題,運用密技術改進了原方案的雙向認證協議,並作為對原方案的改進,基於整數二進製表示的唯一性,提出了一種新的單鑰-鎖對方案。
  18. The system adopts cisco secure acs ( access control server ) 2. 6 of cisco company as the authentication server, iplanet directory servers. 1 as the directory server and star - s1924f switch based on 802. 1x as the authentication client namely user network access device to implement centralize management of the user account and password and so on in all the application, and the authorization access based on port

    系統採用cisco公司的安全器ciscosecureacs ( accesscontrolserver ) 2 . 6作為認證服務器, iplanetdirectoryserver5 . 1作為目錄服務器,以及實達的基於802 . 1x的交換機star - s1924f作為用戶接入設備即認證客戶端,實現用戶在所有應用的賬號與密等相對固定的信息集中管理和基於角色的
  19. Functions are analyzed from the four components of network cipher computer, key distribution management center ( kdmc ), web management computer and secure remote access system ( sras ). suggestions are proposed for confidentiality, authentication and visit control. ipsec protocol architecture, important concepts and characteristics are studied in detail

    分析了密鑰管理中心、網路加密機、 web管理機和安全遠程接入四大部分的功能,給出了vpn網路密機系統的機密性保證、認證和方法,詳細論述了ipsec基本協議、重要概念和特點。
  20. Principles of programming languages, portland, oregon, usa, 2002, pp. 307 - 318. 25 peng li, steve zdancewic. downgrading policies and relaxed noninterference

    1提出了xml的降級題,它把降級策略的焦點從代層轉移到數據層。
分享友人