訪問機制 的英文怎麼說

中文拼音 [fǎngwènzhì]
訪問機制 英文
access mechanism
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : machineengine
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 機制 : 1 (機器製造或加工的) machine processed; machine made 2 (機器的構造和工作原理; 有機體的構造、功...
  1. In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control

    模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的,保證了策略傳輸的密性,完整性。
  2. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的標識鑒別增加了新的用戶安全屬性,即安全標簽和審計掩碼,以增加對安全操作系統下強存取和審計的支持。
  3. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲理,從而構造一種快速存儲、和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的
  4. So the clients are no longer just browsers ; they are web services clients that interact with application services across administrative domains, and those application services can then call back to the shibboleth services of the client to obtain attributes that can be used for the access control authorization requirements

    因此,客戶不僅僅是瀏覽器;它們包括web服務客戶,可以與跨管理域的應用服務進行交互,這些應用服務然後可以回調客戶的shibboleth服務,從而獲取可用於授權需求的屬性。
  5. 6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data

    6 )採用嚴格的方式與權限管理。 fsca系統充分保證了用戶數據的合法性與有效性。
  6. The idea to build up such a model originates from that of " web of trust " model of pgp mixed up with that of the delegation model of spki, as well as its resulted access control strategy by the combinations of trust and delegation policies

    「復合模式」思想包含兩層含義:一方面是它採用了將pgp以用戶為中心的信任模式和spki授權證書相結合;另一方面是它實現的策略基於信任策略和授權策略的有組合。
  7. An abstract model of secure subnet is put forward based on channel model of vpn and secure subnet model of enterprise in charpter three. and double - way authentication access control mechanism of secure subnet is analyzed in detail in charpte four

    首先以「虛擬專用網路」 ( vpn )隧道模型和企業級安全子網結構模型為基礎,提出安全子網的抽象模型,然後詳細討論了安全子網的雙向認證
  8. Extensible access control markup language - or xacml - provides a mechanism to create policies and rules for controlling access to information

    可擴展標記語言(或xacml )提供了創建策略和規則來控信息
  9. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    在數據鏈路層的設計中針對水下聲通道的特點,對于介質協議採用了maca協議,它使用rts - cts控報文握手來解決uan中的隱蔽終端、暴露終端以及功率控題。
  10. The system makes a network security access mechanism suitable for user ' s security policy, including three parts : package filtering router : offering security access control in network layer ; proxy server : used for security access on application layer ; authentication server : used for authentication of user ' s identity

    根據該模型,本文設計了一個防火墻原型系統,該系統提供了一個適合用戶安全策略的網路安全訪問機制,它由以下三個部分組成:包過濾路由器,用來提供網路層一級的安全訪問機制;代理服務器,用來提供應用層一級的;認證服務器,用來提供用戶身份認證。
  11. The mechanism of secure access for information systems

    信息系統的安全訪問機制
  12. Study on real - name access mechanism in the next generation internet

    下一代網際網路實名訪問機制研究
  13. Proxy server ' s study on cache

    系統結構及代理訪問機制分析
  14. The building of the mechanism of multi - layer safety accessing on web application system

    應用系統多層安全訪問機制的構建
  15. They support interoperability by separating the mechanisms of access from the implementation

    它們將訪問機制從實現中分離出來,從而可以支持互操作性。
  16. As i said earlier, jadt provides driver - based access mechanisms so that the java application programmer can work independently of the implementation provider

    就像我前面說過的, jadt提供了基於驅動程序的訪問機制,所以java應用程序可以獨立於實現提供者工作。
  17. Is a uri that, in addition to identifying a resource, provides a means of acting upon or obtaining a representation of that resource by describing its primary access mechanism or network location

    是一種uri ,除了標識資源外,通過描述資源的主要訪問機制或網路位置, url還提供了對資源的表示進行操作或獲取的方式。
  18. So, since no one distribution approach solves all problems, what many organizations have concluded is that they need to support multiple distributed - object protocols and access mechanisms within their enterprise

    因此,沒有一種分佈方法可以解決所有的題,很多組織已經得出了這樣的結論,他們需要在其企業內支持多分散式對象協議和訪問機制
  19. After the analysis of the typical instance of the security attack on the unix operating system, it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix

    本文通過重點分析針對unix操作系統的一些攻擊實例,指出現有的unix操作系統自主訪問機制和超級用戶特權實現方式是最主要的安全題。
  20. Though xml based on metadata relaxes the difference of heterogeneous metadata to some extent, it is difficult to integrate learning resources of different authors and the precision of query is not satisfying for the short of semantic. this thesis makes a tentative exploration to personal analyzing and instructing method in ontology - based e - learning by combining ontology technology and jena ’ s rules based ontology accessing mechanism. it provides an analyzing and instructing mechanism facing on semantic, in order to put forward a solution to realize e - learning individuation

    本文結合wi ( webintelligence )中的ontology (本體)技術和jena (由hp公司的brianmcbride開發,起源於早些時候sirpacapi的工作,其定義了很多的介面來和處理ontology文件)基於規則的本體訪問機制,對基於本體e - learning的個性化分析與指導方法進行了初步的探索和嘗試,並給出了一種面向語義的分析與指導,為實現e - learning的個性化提出了一個可行的解決方案。
分享友人