access policy 中文意思是什麼

access policy 解釋
訪問策略
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • policy : n 1 政策,政綱;方針,方向;方法。2 策略;權謀;智慧;精明的行為。3 【軍事】政治,行政。4 〈蘇格...
  1. An access control policy suitable for mis

    一種適用於管理信息系統的訪問控制策略
  2. Guarantee integrity, you can base code access security policy on these two forms of assembly evidence. strong naming and signing using the

    進行簽名確保了完整性,因此您可以將代碼訪問安全策略建立在這兩種形式的程序集證據的基礎上。
  3. Future versions of the. net compact framework will offer a subset of the policy - driven, evidence - based code access security of the full. net framework

    在. net compact framework的未來版本中,將提供策略驅動的、基於證據的代碼訪問安全模型的子集,該模型已在
  4. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  5. If custom code access security policy is set for the

    設置自定義代碼訪問安全策略,以及使用
  6. Keys to success for rotarian businesses include developing a clear, consistent policy on alcohol and drugs and offering access to an employee assistance program

    扶輪社員事業成功的關鍵,包括了針對吸毒及酗酒制訂明確、一貫的政策,並辦理協助員工計劃讓員工參加。
  7. 5. the ministry of labor and social affairs has adopted a policy of equal access to services and

    恰恰相反,這是一項延續了12年的、逃避和欺騙政策的一部份,是由伊拉克政權最高層制定的政策。
  8. The insurance manager further sent both insurance policies to the address of the complainant s friend, without keeping the complainant s policy in a separate envelope, thereby allowing access to the complainant s personal data as contained on her policy to her friend

    保險公司經理其後更把投訴人及其友人的保險單,置於同一信封內,一併寄給投訴人的友人,因而令她的友人得知載于保險單上有關投訴人的個人資料。
  9. In july 2004, the telecommunications authority announced that the type ii interconnection policy for local fixed - line telecommunications services would be withdrawn by june 2008 to promote investment and consumer choice in high bandwidth customer access networks in telecommunications

    2004年7月,電訊管理局宣布,將於2008年6月撤銷本地固網電訊服務的第二類互連規管措施,以促進在電訊市場高頻寬客戶接達網路的投資,讓消費者有更多選擇。
  10. Defines classes that control access to operations and resources based on policy

    定義根據策略控制操作和資源訪問的類。
  11. The programmed strategy of qim ' s access to available and steady development is : increasing mining production capacity and economic benefits by booming mine through science and technology to achieve increased capacity of continuous progression ; enhancing the ore reserve storage by excavating the prospecting potency of mineral resource ; magnifying scale beneficial result by enlarging output capacity ; adding products with high additional value by progressing towards futhur processing mineral products ; meanwhile, saving the management risk by developing non - steel industry ; concentrating the main body to increase the benefits by separating the subsidiary from the main one and staffs being laid of ; seeking supports of mining industry economic policy from macroeconomic policy to lighten the burden of our enterprise ; dealing well with the problem of guaranteeing the life of the staff being separated for further steadying circumstance of enterprise and society and perfectly realizing the constant development of qim

    規劃的齊大山鐵礦可持續發展戰略是:通過科技興礦來提高采礦的生產能力和經濟效益,達到可持續發展能力的提高;通過挖掘齊礦礦產資源的勘探潛力來提高后備資源的儲備;通過擴大產量規模來增大規模效益;通過礦產品向深加工方向發展來增加高附加值產品;同時,發展非鋼產業來降低企業的經營風險;通過實施主附分離來精幹主體、減員增效。從宏觀經濟政策上來尋求礦業經濟政策的支持,減輕企業的負擔;為了使企業和社會的環境更加穩定,要解決分流人員的生活保障問題,從而更好的實現齊礦的可持續發展。
  12. A study on quot; full and open quot; policy of scientific data access and its significance for reference to china

    科學數據完全與公開獲取政策及其借鑒意義
  13. Web page navigation control pertains to the application s access policy

    Web頁瀏覽控制屬于應用程序的訪問策略。
  14. We point out a new better resolution, adaptive p - persistent csma / cd media access policy, for ethernet after introducing its default in the second chapter. the commercialized local area networks media access control protocol ieee 802. 3 is 1 - persistant csma / cd, which leads distinctly poor performance under heavy loads in the same collision domain

    針對ieee802 . 3局域網介質隨機訪問協議1 -持續csma / cd ,在同一個沖突域內,它的性能在重荷載下有明顯缺陷的問題,分析了p -持續csma / cd協議,提出了一種新的關于概率p的自適應演算法。
  15. The analysis on china - asean access policy in education

    東盟教育準入政策分析
  16. This tree by itself doesn ' t specify any access policy ; it just shows how we ' re grouping the people who might request access ( aros )

    該樹自身並不指定任何權限策略;它只是顯示我們如何對需要權限的人(即aro對象)進行分組。
  17. However, the ease with which employees can publish data worldwide requires is to carefully consider data access policy and security, users reported

    然而,用戶們報告稱,利用(內部網的) ,雇員們能向全世界范圍出版發行數據的簡便性,需要信息系統部門仔細地研究數據訪問政策和安全保障。
  18. This thesis put research emphasis on the shared i / o driver model and access policy in the satellite - carried embedded multiprocessor real - time operating system, in which the processors share a single i / o system

    本文重點研究在多處理器共享i / o的系統中,星載嵌入式多處理器實時操作系統對于共享i / o的訪問策略及驅動模型。
  19. That model has been applied to the civil aviation operation system to satisfy its access policy, which can adapt to the dynamic change of application environment. the experiments show that the strategy works well

    論文把模型運用在該類系統中,滿足了業務系統的權限策略,且能適應應用環境的動態變化,取得了較好的效果。
  20. Your access policy must dictate the possible navigation path for a specific user role in order to prevent a malicious user from navigating to a page for example, through bookmarks to which he or she does not have access

    訪問策略必須指定特定用戶角色可能的瀏覽路徑,以防止惡意用戶瀏覽他或她無權瀏覽的某一頁(例如,通過書簽) 。
分享友人