access control token 中文意思是什麼

access control token 解釋
訪問控制令牌
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • token : n 象徵,記號,標記;表示物,證物;紀念品;代幣,代價券;【語言學】語言符號;【英史】私鑄貨幣;【...
  1. As a result, administrator users have more granular control on what applications install while greatly impacting malicious software that expects the logged on user to be running with a full administrator access token

    這樣,管理員用戶對于應用程序的安裝就有更粒度化的控制,同時對那些期望登錄用戶使用完整的管理員訪問令牌運行的惡意軟體造成了極大的沖擊。
  2. An effective media access control protocol for formatting satellite wireless shared channel is needed. chapter 5 advances a wireless token bus protocol

    本文第五章提出了一種適用於衛星編隊的無線總線令牌協議。
  3. Fddi. information systems - fiber distributed data interface - token ring media access control

    信息系統.光纖分佈數據介面
  4. This protocol is based on current hardware foundation of ethernet and solves access conflict through token - control by creating virtual token on application layer

    該協議基於現有的以太網硬體基礎,在應用層構造虛擬令牌,利用令牌控制來解決網路的訪問沖突問題。
  5. The structure of the system can be adjusted dynamically. the more important is that it makes full use of network bandwidth. it controls the use of network resource through token - control, decreases resource waste causing by access conflict in ethernet communication and achieves high - speed real - time data transmission

    基於虛擬令牌和以太網的實時網路協議一方面為上層調用軟體提供了一個透明的可動態調整系統結構的數據傳輸體系,更重要的是它充分利用了網路帶寬,以令牌方式控制網路資源的使用,降低了以太網通信中訪問沖突引發的資源浪費,從而實現了實時高速的網路數據傳輸。
  6. So these popular medium access control protocols as csma / cd, token - ring etc. are not suitable for hfc system

    所以,目前局域網使用的媒體接入控制mac協議如: csma / cd 、令牌等,不適用於hfc網。
  7. The authentication is done using standard token sharing protocol of gss ( generic security service ) while authorization is done by simply looking for the client ' s dn in the database, then return a limited proxy certificate, which embeds the security policies relating with the requesting user in the virtual organization. ldap stores contents about certificate authority, object policy and locality information and so on. aces enhances the resource severs and enables them to recognize the access control policies embedded in the proxy certificates, and implements the fine - grained access control through combining its own policies with

    訪問控制決策子系統接受它所管轄的虛擬域內用戶的請求,利用gss ( genericsecurityservice )標準令牌交換協議相互驗證身份后,通過查詢數據庫得到用戶相關的授權策略,並把授權策略寫入到代理證書中,返回給請求用戶; ldap目錄服務器儲存了ca證書、資源策略和位置信息等;訪問控制實施子系統通過對應用程序授權部分進行擴展,使其支持嵌入在代理證書中的授權策略,並結合本地的安全策略做出最終決策。
分享友人