说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 不对等访问控制
1)  unequal access control
不对等访问控制
1.
Facing these safe demand, this paper is applied on active label, safety isolation and unequal access control technology based on trusted computing technology, begin from the hardware first floor, build the trust relation among user, platform and network.
针对这些涉密信息系统建设中的安全需求,文章应用基于可信计算的活性标签、安全隔离和不对等访问控制技术,从硬件底层着手,建立用户、平台与网络三者之间的信任关系,实现不同安全等级终端或网络区域之间的可信互连。
2)  access control grade
访问控制等级
1.
Introducing the reputation grade, classifications and access control grade, a new information flow model on P2P based on trust and security grade was described, with the security classification achieved by access control grade, and with the information flow role described by access control grade of two objects.
通过引入信誉等级、密级、访问控制等级等概念,利用访问控制等级划分安全类,以两个客体的访问控制等级描述信息流策略,由此得到基于信任和安全等级的P2P信息流模型。
3)  accessing control
访问控制
1.
The article emphasizes on discussing the two measures to protect the datum in the network:accessing control measure and information encryption measure.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
2.
The paper introduces the three kinds of threatens to campus network s safety and resolving methods, especially showing how to use the method of accessing control to safeguard the campus network
介绍了目前校园网面临的3种安全威胁以及应对技术,重点说明了使用访问控制策略保障校园网安全。
4)  access control
控制访问
1.
In order to take effective precautions against illegal operation of routers and strengthen the security of computer network, this paper briefly introduces some kinds of the configuration methods of access control ASN routers.
为有效防范非法操作路由器,增强计算机网络的安全性,简要介绍了几种控制访问ASN路由器的配置方法。
5)  Access control
访问控制
1.
Application of extended role-based access control under the struts framework;
扩展的角色访问控制模型在Struts结构下的应用
2.
A lattice-based access control model;
一种基于格的访问控制模型
6)  interview control
访问控制
1.
This paper discusses the interview control model based on roles firstly,and then brings forward a model of purview assignment based on role and interview control,finally it was realized in police technological investigation managerial system.
访问控制是软件系统安全性重要的组成部分。
补充资料:不对
1.不答。 2.不合;不睦。 3.不够格。 4.不正常。 5.不正确,错误。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条