存取控制

cún qǔ kònɡ zhì
  • access control
存取控制存取控制
  1. 协同CAD中基于角色视图技术的存取控制

    Access Control Mechanism Based on Role-based View with in Collaborative CAD

  2. 提出了XML数据存取控制规则的压缩与查询方法。

    A method of access control rules compression with query support is given .

  3. 路径表达式(Pathexpression)是一种非过程化的共享资源并发存取控制的描述工具。

    Path expression is a specification language for the synchronization of concurrent access to shared data .

  4. XML文档存取控制研究

    Research on Access Control of XML Document

  5. USB接口存取控制系统研究与设计

    The Research and Design for the Access Control System of USB Interface

  6. 自主存取控制的Petri网建模和分析

    Modeling and Verifying Discretionary Access Control by Colored Petri Net

  7. Notes数据库中存取控制的自维护

    Access Control Self-Maintenance in Notes Database

  8. 这些所学到的媒体存取控制位址,后来被记录在一个MAC位址表中。

    These learned MAC addresses are then recorded in a MAC address table .

  9. MIS应用软件的安全控制&存取控制的安全问题

    Security and Controlling of Applying Software in MIS

  10. 本文的研究内容是(t,n)门限签名认证存取控制技术的应用。

    The research contents of this paper is the application of ( t , n ) threshold signature authentication access control technology .

  11. 星形LAN存取控制方式

    The Medium Access Control of Star LAN

  12. 层级结构中基于一元hash函数的存取控制方法研究

    Research on The Method of Accessing Control in a Hierarchy Based-on One-way Hash Functions

  13. 标记传递法是在LAN(计算机局部网络)中广泛应用的一种存取控制方式。

    Token ring is an access method extensively used in LAN ( Local Area Network ) .

  14. (t,n)门限签名认证存取控制技术的研究与应用是一个有着重要实用价值的研究课题,它能够在特定的背景下得到广泛的应用。

    The research of ( t , n ) threshold signature access control technology is utility , for it can be widely used in some environment .

  15. 所有的用户许可、存取控制和统一资源定位器(URL)管理都很容易设置。

    All user permission , access control , and uniform resource locator ( URL ) management are easily configured .

  16. 一种有效使用ISDN信道资源的信道存取控制策略的性能分析

    Performance Analysis of a Channel Access Strategy for Efficiency of Bandwidth Utilization in ISDN

  17. 它采用身份认证、存取控制、数据机密性、数据完整性等措施,来保证信息在传输中不被偷看、篡改、复制,以保障信息在Internet上传输的安全性。

    To protect the information from pried , modified , copied , and guarantee the security of data in Internet , VPN uses the Authentication , accessing control , data secreting , and data integrity etc.

  18. 同时对常用的局部网存取控制方式进行了对比,提出了采用TOKEN方式较为合理的观点。

    From this point of view , some common access control methods have been contrasted and a more reasonable point-TOKeN method is proposed .

  19. PKI技术能够有效满足网络应用中的机密性、完整性、真实性及不可否认性和存取控制等安全需求。

    PKI can effectively meet many safety requirements for confidentiality , integrality , facticity an acceptability and access control for network applications .

  20. 但是,要充分利用这一高数据速率,目前的IEEE802.11媒体存取控制(MAC)需要加强。

    However , to fully utilize this high data rate , the current IEEE 802.11 medium access control ( MAC ) needs to be enhanced .

  21. VPN(virtualprivatenetwork)通过采用加密、认证、存取控制、协议封装等技术在Internet上构筑安全通道,为处于公共网络两端的内网中的用户建立可信安全连接。

    By using the technologies of encryption , authentication , accessing controlling , tunnel , protocol encapsulation etc , VPN ( Virtual Private Network ) provides a viable approach to transfer data through Internet safely .

  22. 在任务节点中引入RBAC机制对角色属性进行约束以实现对工作流的安全存取控制。

    Injecting RBAC mechanism into task nodes to restrict the role attribute can secure the access control of the workflow .

  23. 为了实现层级结构中安全存取控制和密钥管理,提出了基于一元hash函数的密钥分配和推倒方法。

    To solve the access control problem in a hierarchy . Based on one-way hash functions , an efficient key assignment and derivation method is proposed .

  24. 基于扩展BLP模型的强制存取控制的研究与实现

    Research and Implementation of Mandatory Access Control Based on the Extended BLP Model

  25. 具有强制存取控制的RBAC安全模型的设计与实现泛关系模型的目的在于获得完全的存取路径独立性。

    Design and Implementation of RBAC Security Model of MAC The universal relation model aims at achieving the complete access path independence .

  26. ·利用ICMP错误消息,检查目标子网上数据包过滤设备的存取控制规则;

    · ICMP Error Messages are used to detect the ACL of packet filtering devices on the target subnet .

  27. 实现异构型DDBMS存取控制的ZZ视图管理机制

    ZZ View Management Mechanism for Realizing Access Control in Heterogeneous DDBMSs

  28. 该模型将权限控制分成两层,采用RBAC配合数据分组法与基于读者/作者的存取控制方法,达到OA系统中的权限控制要求。

    It is divided into two levels , one is RBAC with data cluster and the other is the access control method based on the author / reader .

  29. 在资源存取控制软件(RACF)中定义的一个用户、一组用户或者磁盘(DASD)数据集。

    A user , group , or DASD data set that is defined to RACF .

  30. 在实际SOS中这三种存取控制方式还能引起安全隐患,必须结合其他的安全措施和方法来提高操作系统的安全性。

    There are hidden dangers caused by Access Control in the running SOS , for improving security of the operating system other methods must be combined with .