access control requirement 中文意思是什麼

access control requirement 解釋
存取控制請求
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • requirement : n. 1. 要求,需要。2. 要求物,必需品;需要量;必要條件,資格 (for)。
  1. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  2. Commodity house opens to booking need to have the following requirement : ( one ) open to booking a person to already obtained estate to develop intelligence letter, business charter ; ( 2 ) concern gold of sell one ' s own things of access of formulary consign land according to land management department, already obtained land access letter ; ( 3 ) licence of program of hold construction project and permit of construction project construction, already dealt with construction project quality and safety to control procedures ; ( 4 ) schedule of affirmatory already construction and complete consign use time ; ( 5 ) 7 achieve main body project below to seal a top ; 7 with what go up, the 2 / 3 above number of plies that main body project must build engineering budget to invest amount ; ( 6 ) already opened commodity house to open to booking a special account in project seat commercial bank ; ( 7 ) the other condition that law, code sets

    商品房預售需具備以下條件: (一)預售人已取得房地產開發資質證書、營業執照; (二)按照土地治理部門有關規定交付土地使用權出讓金,已取得土地使用權證書; (三)持有建設工程規劃許可證和建設工程施工許可證,並已辦理建設工程質量和安全監督手續; (四)已確定施工進度和竣工交付使用時間; (五)七層以下的達到主體工程封頂;七層以上的,主體工程須建到工程預算投資總額的三分之二以上層數; (六)已在項目所在地商業銀行開設商品房預售款專用賬戶; (七)法律、法規規定的其他條件。
  3. Secondly, based on the function requirement of usb device controller the system was divided into five modules, clock extracting, event detect, physical layer interface, media access controller, endpoint control layer and every module was designed in detail

    其次,針對usb設備控制器的功能要求,將系統分為時鐘提取、事件檢測、物理層、介質訪問層、端點控制層五個模塊並對每個模塊進行了詳細設計。
  4. According to the requirement of electronic documents management in enterprise, an access control mechanism which suit to the traits of electronic documents in enterprise is produced by deeply researching on various access control mechanisms

    對各種訪問控制機制進行了深入的研究,並根據企業電子文檔管理的需要建立了一種適合於企業電子文檔自身特點的訪問控制機制。
  5. The inclusion of both field - level and instance - level access control lists satisfies the requirement for a thorough access - control mechanism

    包含有欄位級和實例級訪問控制列表滿足了完全的訪問控制機制的需求。
  6. Came the requirement for user - based access control

    ) ,出現了對基於用戶的訪問控制的要求。
  7. 3. base on the theory of embedded database and the requirement of security services, an embedded database is analyzed and realized, which can provide authentication services, access control services and nonrepudiation services

    基於嵌入式數據庫和eiscp對安全服務的需求,設計並實現了包含用戶信息表和訪問日誌表的數據庫,提供身份認證、訪問控制和抗抵賴服務。
  8. This thesis presents the realization of the web system on the thought of 3 - tier architecture : data, middle and presentation tiers. it concludes the database design, the way of programming object oriented components, the access of database, the web form design based on asp. net and the authorization control. at last, it gives the requirement of running this system and the way of security management

    在系統實現上,根據web三層設計的思想,從數據層、中間層和表現層來設計系統,其內容包括數據庫的設計,面向對象的組件編程, web數據庫訪問技術的研究,基於asp . net的web表單的設計,權限控制設計等,並對系統安全管理的問題進行了探討和研究。
  9. Multiuser detector ( mud ) makes full use of the information of all the users that cause multiple access interference ( mai ) to detect the desired user. therefore, as compared with the conventional detector, it has better resistance capability to the mai and the so - called near - far problem. since the multi - user detector reduces the precision requirement of the power control, it can provide higher efficiency for frequency use, and thus improves the capacity of the communication system

    多用戶檢測技術在傳統檢測技術的基礎上,充分利用造成mai干擾的所有用戶信號信息對單個用戶的信號進行檢測,從而具有優良的抗干擾性能,解決了遠近效應問題,降低了系統對功率控制精度的要求,因而可以更加有效的利用頻譜資源,顯著提高系統容量。
  10. In order to realize network contents ncccss control, the main technical task is to capture user ' s requirement data packet and to filter the desired ip by using access specification

    在系統的設計與實現中需要解決的最重要的技術問題是用戶請求數據包的截獲和ip地址可訪問性判定問題。
  11. Multi - uesr detection ( mud ) refers to signal detection in multiple access communications. this detection has many good properties, such as decreasing multiple access interference, canceling out or moderating near - far resistance, able to decrease the requirement for output control, compensating the effects due to inoptimal orthogonality, improving system performance and increasing system capacity. mud is one of the methods that can overcome the mai in cdma with most potential and complete and becomes one of the critical techniques in the third generation mobile communication

    多用戶檢測是指多址通信中的信號檢測,具有抑止多址干擾;消除或減輕遠近效應;可適當降低對功率控制的要求;彌補擴頻碼互相關性不理想造成的影響;改善系統性能,提高系統容量等眾多優點,是克服cdma多址干擾最有潛力、最徹底的一種方法,並已成為第三代移動通信標準中倡導的關鍵技術之一。
  12. General compressing technologies are not proper in some circumstances for the receivers are always required to decompress the data completely to manupulate the original data ( querying, validating etc. ). the embedded document structure of xml also makes it difficult to perform access control because the traditional file level access control systems could not fulfill the requirement of element or attribute level access control. in the paper we first present a scheme for xml - based data exchange which is an xpath - query - friendly compressor for xml

    壓縮技術是提高交換效率的一種方法,但接收方需要對壓縮文檔完全解壓才能夠執行進一步的操作,在很多應用中這種方式並不適用,這就提出了如何在高效壓縮的同時在壓縮后的xml文檔上進行查詢等操作的問題;另一方面,由於xml文檔的層次結構的特殊性,傳統的文件級別的訪問控制已經不能適應在元素、屬性的級別上進行訪問控制的需要,所以對只需要訪問部分xml文檔內容的用戶進行有效的數據訪問控制也是xml數據訪問控制面臨的一個問題。
分享友人