身份原则
-
Slavenode能够通过多重服务原则和双重身份原则两个内存服务机制,来满足用户不同容量的内存资源需求。
Slave node meets different capacities of memory resource demanded by users through two memory service mechanisms & multi-service principle and dual identity principle .
-
阐述了决定土地监测信息系统模型设计的数据基础、身份确认原则、时间综合期、时间粒度和查询功能等几个关键因素。
The analysis describes several key factors such as the data base , identity validation rules , the temporal synthesis period , the temporal granularity and the desired query functions .
-
增强:通过对信任的区域自动创建子网的方式,改变身份验证的原则。
Enhancement : Changed principle of authentication by a way of automated creation of trusted zone on the basis of subnet .
-
法律原则虽从原则家族而来,但她已取得了法律的身份,法律原则当然可以作为司法裁判的依据。
Legal principle is such kind of principle with its legal nature , which certainly could be used as a kind of standard of judicial verdicts .
-
本文讨论了电力公司在电力市场中的作用,研究了实现其双重身份统一的原则和途径。
This paper discussed the important role that power company plays in the power market , the principle and way to make union of the different identity .
-
农民合作经济组织变迁的动力来源于其寻求多重身份与合作原则的叠合认同,即具备多重身份而又不丧失合作原则的独具特征,成就其多元一体格局。
The dynamics of the changes of rural cooperative economic organizations stems from superposition recognition between its multiple identities and cooperation principles , that is to say , rural cooperative economic organizations got multiple identities without losing the unique characteristics of the principles of cooperation .
-
论营利性国企经营者的代表身份与利益分配原则
On the Representative Identity and Benefit Distribution Principle of the State-owned Profitable Enterprises ' Operators
-
尽管最终细节仍在谈判之中,但预计瑞士和德国本周将在产生税收收入、同时保护储户身份秘密的总体原则下签署类似协议。
While the final details are still under negotiation , the broad principles of raising revenue while protecting the identity of account holders is expected to be replicated in a deal between Bern and Berlin this week .
-
针对此种情况,本文首先考虑数字图书馆领域应用数据通常存在单一个体对应多条记录的情况,特别分析了此情况下用户敏感数据的侵犯情况,并提出了三种具体的身份保留匿名化原则。
In such cases , the thesis first considers the data with multiple records corresponding to a single individual . In particular , it analyzes the violations of the sensitive data . And it brings forward three specific identity-reserved anonymity principles .