These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
The domain's support provides this key feature to augment the functionality provided by the Role Based Access Control (RBAC).
对域的支持提供这个关键特性,以此补充RoleBasedAccess Control (RBAC)提供的功能。
Some key scenarios that are expected as part of the commercial launch of the access control service are.
以下一些重要的解决方案可以作为访问控制服务商业发布的一部分。
The key is to have some form of version control and access management to the architecture structure.
关键是要对体系结构的结构采用某种形式的版本控制和访问管理。
For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.
对于不需要基于角色的访问控制,并且只实现一个加密密钥的简单应用程序,那么可以将一个用户出口用于所有加密和解密函数。
At last, some key technologies of new generation Internet are discussed, such as access control, trustworthy route, quality of service, multi-homing and network management.
并对新互联网体系中的接入控制管理、可信路由及服务质量、多流传输、网络监测管理等关键技术进行了研究和探讨。
Instead of clicking on the Voice Control icon on your Home screen you can also access Voice Control by holding in the pause key.
除了点按主屏幕上的语音控制图标外,您也可以长按开始/暂停键来开启语音控制。
When you get the set of all audit rules for a registry key, the set contains the minimum number of rules currently required to express all the access control entries.
在获取某个注册表项的所有审核规则的集合时,该集合包含当前表示所有访问控制项所需要的最低数量的规则。
However, the modes of centralized access control and key distribution limit the extension of their group sizes.
然而,由于其集中式访问控制和密钥分配方式,限制了组规模的进一步扩展。
A semi-colon separated list of registry key paths for change access control .
可以更改访问控制的、带有路径的键和值的列表。
To provide reliable and guaranteed services for these applications, priority scheduling in the medium access control (MAC) layer is one of the key issues.
要为实时业务提供可靠的有质量保证的服务,无线网络媒体访问控制层(mac)的优先级调度问题是一个关键。
An effective access control model is the key of a P2P system's great efficiency and stabilization.
提供一种高效的访问控制模型是保证P 2 P系统高效、稳定的关键。
Routers are playing an important role in the network flow of the computer -network increasingly, where the key technology is the configuration of access control lists.
路由器在计算机网络流量控制方面的作用日益显著,其关键技术就是访问控制列表的配置。
Usage control is referred to as the next generation method of access control, whose UCONABC model needs perfecting in some key technologies.
使用控制被称为下一代的访问控制方法,其模型UCONABC在许多关键技术方面还有待完善。
This paper studies the several key issues of media access control (MAC) layer of EPON, including MAC control sub-layer and RS sub-layer.
本文主要对EPON的媒体接入控制(mac)层(包括MAC控制子层和RS子层)中的若干关键问题进行了深入的研究。
This paper studies the media access control protocol and key technologies in ultra-wideband wireless networks.
该文研究超宽带无线网络的媒体接入控制技术和协议。
Through study on SSL and its key technology, it is recommended that the SSL-based certificate authentication can be used as client access control method in database systems.
本文通过对SSL及其关键技术的研究,提出了在网络数据库系统的用户访问控制中使用基于SSL和证书的双向身份认证。
In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.
为了设计一种交叉域访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户的PK I方法。
The service of access control could limit the access to key resources, prevent illegal users from breaking in and also prevent legal users from destroying these resources inadvertently.
通过访问控制服务可以限制对关键资源的访问,防止非法用户的侵入或者因合法用户的不慎所造成的破坏。
The upstream multiple access control is a key problem in the passive optical networks (PONs).
上行方向的多址接入控制是无源光纤网(PON)中的一个关键问题。
Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.
为实现信息系统的安全目标,需要系统能够提供相关的安全服务:身份标识与认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。
How to provide access control function for CSCD based on P2P network to make the cooperative design more security, it has become a key question studied at present.
如何给基于P 2 P网络的协同设计提供合适的访问控制功能,使人们可以更安全的进行设计活动,已经成为一个急待解决的问题。
This paper presents a multi-group access control scheme that achieves multi-privileged access by combining the centralized and distributed key management scheme.
该文提出了一种多重组的访问控制方案,该方案使用集中式与分布协同式相结合的密钥更新算法实现了多权限的控制。
By database encrypting, and key management and users access control, we can protect the database from destroying.
通过数据加密、密钥管理、用户拜访控制等一系列的手腕来维护数据库内部数据的安全。
The user might not be able to access the intended control by using the access key and a control other than the one that is intended might be enabled.
使用者可能会无法使用便捷键存取所要的控制项,而且可能会启用不想要的控制项。
Firstly, the basic principles and the key techniques of access system is introduced, which includes modulation, error control, multi-address access, and embedded-system techniques.
文章首先详细介绍了接入系统的基本原理和关键技术,包括调制技术、差错控制技术、多址接入技术、嵌入式系统技术。
Power control is a key technique in CDMA cellular mobile communication systems. It can combat near far effect, reduce multiple access interference and improve the system capacity.
功率控制技术是CD MA系统克服“远—近效应”,降低多址干扰、增大系统容量的一项关键技术。
Based on sufficient analysis of current SOAP protocol and access control, to analyse the key technology, and draw conclusion on the access control based on SOAP.
在对SOAP协议的基本内容和访问控制技术充分讨论的基础之上,对其中关键技术进行了分析,总结出了基于SOAP实现访问控制的若干结论。
Conditional access system (CAS) is the key to realize the increment of the DVB system and provides effective system management and subscriber control.
条件接收系统(CAS)是DVB系统实现增值的核心,能够提供有效的系统管理和用户控制。
An access key allows a user to select the other control by pressing the ALT key with the access key.
访问键允许用户通过按alt键和访问键来选择另一个控件。
应用推荐