• These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    youdao

  • Another key to scaling access control is grouping access.

    另一个升级访问控制关键对访问分组

    youdao

  • The domain's support provides this key feature to augment the functionality provided by the Role Based Access Control (RBAC).

    支持提供这个关键特性以此补充RoleBasedAccess Control (RBAC)提供功能

    youdao

  • Some key scenarios that are expected as part of the commercial launch of the access control service are.

    以下一些重要解决方案可以作为访问控制服务商业发布一部分

    youdao

  • The key is to have some form of version control and access management to the architecture structure.

    关键要对体系结构结构采用某种形式版本控制访问管理

    youdao

  • For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.

    对于需要基于角色访问控制并且实现加密密钥简单应用程序那么可以一个用户出口用于所有加密解密函数

    youdao

  • At last, some key technologies of new generation Internet are discussed, such as access control, trustworthy route, quality of service, multi-homing and network management.

    互联网体系中的接入控制管理可信路由服务质量、多流传输、网络监测管理关键技术进行了研究探讨。

    youdao

  • Instead of clicking on the Voice Control icon on your Home screen you can also access Voice Control by holding in the pause key.

    除了屏幕上语音控制图标外可以长按开始/暂停来开启语音控制。

    youdao

  • When you get the set of all audit rules for a registry key, the set contains the minimum number of rules currently required to express all the access control entries.

    获取某个注册表项所有审核规则集合时,集合包含当前表示所有访问控制项所需要最低数量的规则。

    youdao

  • However, the modes of centralized access control and key distribution limit the extension of their group sizes.

    然而由于其集中式访问控制密钥分配方式限制规模进一步扩展

    youdao

  • A semi-colon separated list of registry key paths for change access control .

    可以更改访问控制带有路径和值的列表

    youdao

  • To provide reliable and guaranteed services for these applications, priority scheduling in the medium access control (MAC) layer is one of the key issues.

    实时业务提供可靠质量保证的服务,无线网络媒体访问控制(mac)的优先级调度问题一个关键

    youdao

  • Medium Access Control (MAC) protocol is the key technology in wireless ATM systems.

    媒介接入控制(mac)层协议无线atm的一项关键技术

    youdao

  • A key challenge in Web services security is the design of effective access control schemes.

    一个关键安全挑战就是设计有效访问控制机制

    youdao

  • An effective access control model is the key of a P2P system's great efficiency and stabilization.

    提供一种高效访问控制模型保证P 2 P系统高效稳定关键

    youdao

  • Routers are playing an important role in the network flow of the computer -network increasingly, where the key technology is the configuration of access control lists.

    路由器计算机网络流量控制方面作用日益显著,其关键技术就是访问控制列表配置

    youdao

  • Usage control is referred to as the next generation method of access control, whose UCONABC model needs perfecting in some key technologies.

    使用控制称为下一代访问控制方法模型UCONABC许多关键技术方面还有待完善

    youdao

  • This paper studies the several key issues of media access control (MAC) layer of EPON, including MAC control sub-layer and RS sub-layer.

    本文主要对EPON媒体接入控制(mac)(包括MAC控制RS子层)中的若干关键问题进行了深入的研究

    youdao

  • This paper studies the media access control protocol and key technologies in ultra-wideband wireless networks.

    该文研究宽带无线网络媒体接入控制技术协议

    youdao

  • Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.

    本文通过SSL及其关键技术研究,提出了网络数据库系统的用户访问控制使用基于SSL证书的双向身份认证

    youdao

  • Change the access control list (ACL) for a key container.

    更改密钥容器访问控制列表(acl)。

    youdao

  • View the access control list (ACL) for a key container.

    查看密钥容器访问控制列表(acl)。

    youdao

  • In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.

    为了设计交叉访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户PK I方法

    youdao

  • The service of access control could limit the access to key resources, prevent illegal users from breaking in and also prevent legal users from destroying these resources inadvertently.

    通过访问控制服务可以限制关键资源访问,防止非法用户侵入或者因合法用户的不慎所造成的破坏。

    youdao

  • The upstream multiple access control is a key problem in the passive optical networks (PONs).

    上行方向的多址接入控制光纤(PON)中的一个关键问题

    youdao

  • Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权访问控制服务、非否认服务、机密性服务、完整性服务。

    youdao

  • How to provide access control function for CSCD based on P2P network to make the cooperative design more security, it has become a key question studied at present.

    如何基于P 2 P网络协同设计提供合适的访问控制功能使人们可以安全的进行设计活动,已经成为一个急待解决问题

    youdao

  • This paper presents a multi-group access control scheme that achieves multi-privileged access by combining the centralized and distributed key management scheme.

    该文提出了一种多重组的访问控制方案,该方案使用集中式分布协同式结合的密钥更新算法实现了多权限的控制。

    youdao

  • By database encrypting, and key management and users access control, we can protect the database from destroying.

    通过数据加密密钥管理用户拜访控制等一系列的手腕维护数据库内部数据的安全。

    youdao

  • The user might not be able to access the intended control by using the access key and a control other than the one that is intended might be enabled.

    使用者可能无法使用便捷存取所要的控制项,而且可能会启用不想控制项。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定