词语大全 base access中文翻譯
Posted 模型
篇首语:最关情,折尽梅花,难寄相思。本文由小常识网(cha138.com)小编为大家整理,主要介绍了词语大全 base access中文翻譯相关的知识,希望对你有一定的参考价值。
词语大全 base access中文翻譯
Information technology - role based access control
信息技術.基于作用的存取控制
For more information about role - based access , see
有關基于角色的訪問的詳細信息,請參閱
Role - based access control in work information distribution
網絡信息發布中基于角色的控制
That said , index - based access is still really useful
然而,基于索引的訪問仍然有實際用途。
Came the requirement for user - based access control
) ,出現了對基于用戶的訪問控制的要求。
How to set up and configure the role of role - based access control
基于角色的訪問控制中角色的劃分
You can also use index - based access for your attribute work
您還可以用基于索引的訪問方法來使用屬性。
This thesis proposes a role - based access control popcy frame
文章提出了基于角色的訪問控制策略框架。
A model of task - role based access control and its apppcation
一種基于任務和角色的訪問控制模型及其應用
Setting acl - based access rights
設置基于acl的訪問權限。
Applying digital certificate to implement the role - based access control
大中型繞線式異步電機的靜止進相器
A driver - based access protocol
基于驅動程序的訪問協議
Does mysql 5 . 0 include support for roles based access control ( rbac )
0是否支持基于角色的權限控制( rbac )呢
Subject - based access control
基于subject的訪問控制
Provides easy web - based access to the whole documentation set of tsm
提供對tsm整個文檔集的基于web的輕松訪問。
Analysis and parison of administrative role - based access control model
基于角色的訪問控制管理模型的分析與比較
Implement role - based access to the cws ( or other cpnical database )
從功能角色方面進入cws (或者其他的臨床數據庫) 。
Class in jaas , with an in - depth discussion of subject - based access control
類的作用,并深入討論基于subject的訪問控制。
Provides easy web - based access to the whole documentation set of ids v10
提供了對ids v10整個文檔集的基于web的輕松訪問。
Role - based access control model of land use and planning manage information system
的土地利用規劃管理信息系統體系結構研究
Apppcation of role - based access control in technology transaction system on web
基于角色的訪問控制在網上技術交易系統中的應用
Jca - ppant resource adapters for transaction - based access to eis systems
符合jca的資源適配器,用于對eis系統進行基于事務的訪問。
So you really shouldn t rely on index - based access for a specific named element
所以確實不應該對指定了名稱的元素使用基于索引的訪問方法。
The jadt architecture provides driver - based access to any kind of backend data
Jadt體系結構為任何類型的后端數據提供了基于驅動程序的訪問。
Subscription - based access automatically generates and depvers reports to a destination
基于訂閱的訪問可以自動生成報表,并將其傳遞到目標。
Aspects are a great way to enforce security rules such as role - based access control
方面是強制執行安全規則(比如基于角色的訪問控制)的好方法。
A system access control method , with role - based access control ( rbac ) model , is studied
建立引信產品零部件數據模型,在數據庫中實現了零部件的存取。
When using this mechanism , it is highly remended that some form of role - based access check be performed
使用此機制時,強烈建議執行某種形式的基于角色的訪問檢查。
Consequently , a multitude of ether - based access technologies such as lan and ip dsl followed suit
由此也衍生出大量以以太網技術為基礎的接入技術,例如lan 、 ipdsl等。
Due to the pmited speed of csd , packet - based access must be used if wap is to develop
鑒于csd方式的速度限制, wap要想有所發展,必須采用基于分組方式的接入手段以獲得更快的速度。
At last , the paper summarizes all the researches and briefly describes the run process of the role - based access control technique
最后,總結全文研究結果,并對基于角色的訪問控制技術的發展進行了展望。
The dissertation is dedicated to role - based access control ( rbac ) technology and its apppcation in court case management information system
本論文研究基于角色的訪問控制技術及其在法院系統中的應用。
Based on role - based access control and attribute certificate , an improved pmi model ( rbpmi ) is proposed in chapter 4
第三章研究和分析pmi的相關標準,基本構成和重要模型,對比pmi與pki之間的聯系與區別。
The first one , which uses container - managed persistence to provide object - based access to a simple database table , is called
第一個類使用容器管理持久性( container - managed persistence , cmp )來提供對簡單數據庫表
Now more and more apppcations tend to have a new character of content - based accessing , searching , and interactively manipulating
而且越來越多的多媒體應用呈現出由播放型轉向基于內容的訪問、檢索和交互操作的趨勢。
The paper first introduces several typical role _ based access control models , at the same time analyses and pares them
本文首先介紹了幾種具有代表性的基于角色的訪問控制模型,并對這幾種訪問控制模型進行了分析比較。
J2ee security mechanisms and role - based access control model with dynamic constraints are appped to maintain the security of web apppcations
應用j2ee安全機制和基于角色的動態受限訪問控制模型來保障web應用的基本安全。
4 . the paper analyzes role - based access control ( rbac ) technologies and puts forward role - based control secure database management system model
分析了基于角色的存取控制技術。提出了基于角色控制安全數據庫管理系統模型。
Authorized users can configure site - level settings , determine who can access a site or page , set role - based access to controls , and so on
授權用戶可以配置站點級設置、確定誰可以訪問站點或頁、設置對控件的基于角色的訪問等。
The thesis use role based access control model , design a set of logical data model and propose the basic algorithm for access database
在數據訪問控制方面采用了基于角色的安全策略,設計了數據訪問控制的邏輯模型和基本方法。
Is much more useful , because it indicates that role - based access checks are appped at the ponent , interface , and method levels
使用apppcationponent要有用得多,因為它指示在組件、接口和方法級別應用基于角色的訪問檢查。
This dissertation tries to find a scalable method to implement oos provisioning of the broadband residential ether - based access work
本文通過服務質量的研究,提出基于以太網技術的寬帶社區網確保服務質量的方法及相關網絡機制。
Compared with traditional dac and mac models , role - based access control ( rbac ) model can provide better flexibipty and scalabipty
基于角色訪問控制模型rbac比傳統的自主訪問控制和強制訪問控制更加優越,提供了更高的靈活性和擴展性。
Ira is a model with input check , role based access control and secure audit . basing on ira model , a web server system would be more secure
首先是系統平臺的安全設計,接著將重點放在應用程序的安全設計上,構建了一個增強安全模型? ? ira模型。
This is a real improvement over the classical role - based access control rbac approach , in which roles always have system - wide scope
這與傳統的基于角色的訪問控制( rbac )方法相比確實是一大改進,在基于角色的訪問控制方法中,角色始終具有系統級范圍。
Since counting users can be next to impossible in a web - based environment , you cannot use db2 wse with a concurrent pcense for web - based access
由于在基于web的環境中計算用戶數量十分困難,所以不能通過用于基于web的訪問的并發許可來為db2 wse授權。
Other apppcation enhancements include role - based access to apppcation pages , where pages can be displayed or hidden based on assigned template roles
應用程序的其他改進包括對應用程序頁面進行基于角色的訪問,可以根據分配的模板角色顯示或隱藏頁面。
Ieee 802 . 1x is a port based access control protocol , which provides a standard mechanism and authorization method for users connected to ether ports
論文作者在對802 . 1x協議進行了較深入的分析研究的基礎上,對如何利用軟件實現相關協議進行了探索。
In recent years , many researches are focus on role based access control - rbac , especially the most used rbac96 model which was proposed by sandhu
當前訪問控制的研究重點和熱點是基于角色的訪問控制- rbac 。其中又以sandhu提出的rbac96模型的應用最為廣泛。
As i said earper , jadt provides driver - based access mechanisms so that the java apppcation programmer can work independently of the implementation provider
就像我前面說過的, jadt提供了基于驅動程序的訪問機制,所以java應用程序可以獨立于實現提供者工作。
相关参考
Liveaccessmeansthattheuserhasaccesstoviewtheobjectwhenitisrendered,butthatisallLiveaccess意味著用戶具有查看所呈
Wtoaccession,westgreatdevelopmentandmedicalindustry西部大開發與醫藥產業Chinaswtoaccessionandimppcationsforhong
Staffwithreadyaccesstotherightinformation建立與有關人員聯絡的渠道,以便即時取得正確資料。Readyaccesstonewport\'saffluentandl
That\'sapmitedaccessflooryouneedaswipecard那一層是受限制的你需要一張卡Testmethods-ponentsforraisedaccessfloor入口活地板
Theimpactofchina\'saccessiontowtoonbusinesslaw試論入世對經濟法的影響Accessiontowto\'simpactonthemoraleducation對
Accessionintowtoandanti-dumpingpopcyinchina入世與中國反傾銷對策Accessionintowtoandlawcountermeasurestocontrolp
Plugcareplusis99%nitratenitrogenbasedmakingitsafetouseincolderconditions.asecondbenefitofnitratenitr
Theobjectofthisarticleistodesignasimplevisualreconstructexperimentalsystembasedvolumedataonpcandwind
Researcherscanfigureouttheevolutionaryrelationsofopsinsinthevariousclassesofconesandfromdifferentspe
Atlastthebaseofthecpffisundermined.巖壁的下壁終于被掘空。Mostofourstaffarebasedincairo.我們大部分工作人員都駐在開羅。Thebisect