网站首页  词典首页

请输入您要查询的英语单词:

 

单词 Access control
例句
1 Club 2000 features an Access Control System which enables members to book and use facilities with a single magnetic strip membership card.
2 The bad news is that without proper access control, anyone else can too.
3 A distributed wireless medium access control protocol is disclosed.
4 Research of Constraint Access Control Technology under Distributed Environment.
5 acl: An access control list specification.
6 Study on Dynamic Access Control in Hierarchical Firewall System.
7 How to: Add or Remove Access Control List Entries.
8 Access control is an important technology that is used to protect system resources from unauthorized user access, change, destruction.
9 Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
10 For example , ensuring that access control mechanisms work as advertised is a classic functional testing exercise.
11 By analysis of the current popular method of access control, point out their deficiencies.
12 Based on the policies of spatial data access control to construct the model of spatial data access control.
13 Entity set access control and validation is enabled through query operations by using query composition.
14 Gets a Boolean value that specifies whether this Access Control Entry (ACE) is inherited or is set explicitly.
15 Aim at the characters of spatial data access control, the concept of spatial region access control based on spatial index was proposed.
16 BasicAclProvider : Retrieves access control lists ( ACL ) entries for domain object instances data access object ( DAO ) .
17 The access control list ( ACL ) structure is invalid.
18 Since that date some 1.5 million hotel rooms and cruise ships cabin doors have been fitted with Keycard access control systems.
19 Each set-top decoder would then have its Macrovision-component circuitry individually addressed and activated through the network's addressable access control system.
20 In addition, the upstream data utilizing time division multiplexing removes the distance limitations of shared media networks that utilize CSMA/CD as a media access control protocol.
21 In a token-bus network, a controlled interval of time, equal to one slot time, during which a data station, having transmitted a medium access control frame, pauses and listens for a response.
22 The protocol the author designed for SuperPON, provides half-static and demand dynamic access control method according to different delay requirements.
23 The open environment poses the unique security challenges to access control mechanism due to its distributivity, inherent heterogeneity and highly dynamic nature.
24 In addition to the IIS and ASP.NET configurable gatekeepers, you can also use principal permission demands (declaratively or imperatively) as an additional fine-grained access control mechanism.
25 SOCKS Protocol is a kind of proxy protocol. It is on the session layer - the 5th layer of OSI model, which can carry through the fine-grained access control to the transmitted data.
26 Commercial Centre CCTV system, patrol system, TV aerial system, carpark access control sensor system.
27 First, the paper presents the basic knowledge of XML and XML Access Control Language used to access control to XML document.
28 The United States is also seriously considering the use of Basic Access Control (BAC) to reduce the possibility of skimming or eavesdropping when the passport is read at ports-of-entry.
29 Through the JTAG interface to access the On-chip storage space, implemented the storage access control mechanism based on the principle of handshake.
30 The system should be flexible enough to handle the dynamic access control problems in an existing hierarchy.
31 By introducing synchronous clock and token chain, network nodes can share a common data link, and their access control circuits can be as simple as only using several D F/Fs.
32 This setting is used as the preferred download method. The use of public files is more efficient, but does not provide any access control.
33 To which the access control list entries will be copied.
34 Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path(DCP) searching algorithm based on binary tree.
35 Integrating with firewall, IDS and IP tunnel,(http:///access control.html) the system constructs secure environment of data access control and data transmission.
36 SSL VPN's value including many aspects, most main sharpens the access control ability, the security, easy to use and the high investment repayment rate.
37 On the Basics tab of the File Protection document, accept the default options and modify the access control list to make sure that the domino/html/web2.0 directory is specified as the Path.
38 This paper proposes the role concept, discusses the dynamic access control of role-based workflow status, and describes and analyses the formal model.
39 The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.
40 The model has been successfully applied to the Scientific Instruments Sharing Service Platform of Yunnan and greater data access control capabilities are achieved.
41 The authorization and access request rules and constraints of spatial region access control were defined, and the method of spatial data access control was described in detail.
42 However many kinds of the intelligent access control system are used in jail, cashbox of bank, channels of airport and computer's room.
43 This paper presents a multiple access control protocol (PPBMA) for wireless cellular network, which is based on packet priority, and ISDN services can be easily implemented.
44 This paper describes the policy of resource access control with capability policy has dynamic maintenance characteristic.
45 Shibboleth is an Open Source project that provides federated identity and access control between academic institutions.
46 After decoding the user role encapsuled in active packet, we can obtain the method describing policy of access control in policy store(), called capability.
47 For more information, see How to: Add or Remove Access Control List Entries.
48 Based on media access control(MAC) protocol and transport control protocol(TCP) performance analysis of IEEE 802.11 WLAN, a novel MAC protocol, BDCF, is proposed in this paper.
49 An optimized medium access control protocol, OD-DCF is proposed to support both smart adaptive array antennas and normal omnidirectional antennas simultaneously in one WLAN.
50 AclEntry: Marker interface representing an access control list entry associated with a specific domain object instance.
51 Resources access control (AC) is an essential defensive measure against a large number of security attacks.
52 A new two-level scheme of access control based on a single-code CDMA system supporting multiclass traffic is proposed.
53 Security management involves specification and deployment of access control policies.
54 The key techniques of multi mode in dual band WLAN (Wireless Local Area Network) in PHY (Physical) and MAC (Medium Access Control) layers are analyzed.
55 Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
56 The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).
57 In user access control, the system realizes user access right control, operation flow control and change control.
58 This paper will discuss the application of RF card in access control system, a series of new technology including Permutation Code is used to solve the safety problem.
59 To guarantee access security in network collaborative enterprise modeling systems, establishing access control function is in demand.
60 A network construction of the small distributed all digital field control system and its access control style of token passing combined with master-slave have been presented in this paper.
61 Assigns access rights to the queue based on the contents of an access control entry.
62 To solve low channel utilization problem caused by long propagation delay in wireless networks, a fast reservation on-demand transmission (FRODT) medium access control (MAC) protocol is proposed.
63 On study of Role-Based Access Control(RBAC)model and Generalized Framework for Access Control(GFAC), the generalized model for access control based on RBAC and GFAC was presented.
64 Especially in-depth study the communication mechanism between services, the access control service and traffic statistics service, given the corresponding design models and test results.
65 Using the NOT operator( ), further restriction can be placed on access control.
66 S-MAC is a medium access control protocol based on competition for wireless sensor network.
67 Multilevel security requires additional mechanisms for enforcing mandatory access control that prevents the establishment of a signaling channel and prevents unauthorized disclosure of information.
68 To provide reliable and guaranteed services for these applications, priority scheduling in the medium access control (MAC) layer is one of the key issues.
69 So this paper presents a design which use the combination of RFID technology and face recognition technology for identity verification in access control system.
70 Gets flags that specify the inheritance properties of this Access Control Entry (ACE).
71 It includes mandatory access control built on top of the Flux Advanced Security Kernel (Flask) security architecture, including type enforcement and multilevel security (MLS), all as plug-in modules.
72 The CX600 can act as Multi Service Edge (MSE) to implement access control and management of DHCP, IPoE, and leased line subscribers.
73 One method to satisfy the access authority on file access is to implement an access control list (ACL).
74 Access control is the component of the e-commerce application that determines whether a given user can perform a given action on a given resource.
75 How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
76 The inherited access control list ( ACL ) or access control entry ( ACE ) could not be built.
77 It provided support of secure remote login, the secure file transfer, the access control and the port forwarding.
78 The three-handshake broadcast protocol(THBP) was introduced as a single channel synchronous media access control protocol for multi-hop wireless networks.
79 For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
80 File security access control is the core of the bank automatic teller machine security.
81 In order to resolve the problem of unsatisfied quality of service in intelligent building Web, an industry Web design of intelligent building based on medium access control protocol is presented.
82 Using black-box model to describe workflow system with local dynamic to illustrate the state-based dynamic access control.
83 Finally, check point and access control was used for tolerance and security of the system.
84 Database NotesACL Represents a collection of all the access control list entries for a database.
85 Access control is one of the most important problems of grid computing. The aim of grid access control is to apply the authorization police in heteroid and dynamic environment.
86 In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.
87 A weighted role for activating task and periodic time authorization is an unsolved major problem for the access control of a workflow management system (WfMS).
88 The index in the array at which to begin copying the access control list entries.
89 Realm Write Operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
90 Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
91 An access rule represents a combination of a user's identity, an access mask, and an access control type (allow or deny).
92 There is, however, a built - in Access Control List mechanism involving flat files or databases.
93 A functional unit that interconnects two local area networks that use the same logical link control protocol but may use different medium access control protocols.
94 Usage control is referred to as the next generation method of access control, whose UCONABC model needs perfecting in some key technologies.
95 Automatic anti-theft system: Including entrance control system and access control system, anti-theft alarm system, visual monitoring system, intercommunication system, patrol system, etc.sentence dictionary
96 A resource access control mechanism is needed in such a sophisticated system.
97 This solution solves the access control problem in DHCP environment.
98 Resource access control policies. Provide the ability to grant access to resources by users or groups and assign attributes to protect those resources.
99 Software system comprises some main subsystems such as the TSS embedded OS, host interface specification, file access control module, explicit authorization table management and audit system.
100 With the addition of standard software components, the new controller eliminates the need for separate, dedicated access control, CCTV, intrusion, and intercom systems.
101 Designed as an electronic locking platform for indoor applications, the unit can be combined with any access control device to provide a self-contained electronic access solution.
102 Access control , car parks, AFC , One Card solution, payment system etc.
103 In this paper, we propose a new multiple access control (MAC) protocol for underwater acoustic Ad hoc networks, namely, the parallel transmission multiple access (PTMA) protocol.
104 Represents an abstraction of an access control entry (ACE) that defines an audit rule for a pipe.
105 That solution combines the computer technology, such as access control, database security, and firewall etc with security requirement of banking business in the financial information system well.
106 With access control service, we can restrict the approach to critical resource, avoiding damage brought by illegal user's intrusions or legal user's inappropriate operations.
107 The access control controls callings on objects, in this respect (), access decision method was described.
108 If the object does not have access control list, the system grants full access to everything.
109 In this respect they share with Facebook a similar style of distributed access control ( D 2 ).
110 Has been widely used in logistics, data acquisition, industrial automation, business automation , security access control and vehicle identification, automatic toll collection and other fields.
111 The theoretical model of role access control is discussed and analysed. Meanwhile, the excogitation of authority management based on user group is given under the B/S mode of J2EE frame.
112 What is the default access control list file for the Resource Management and Control ( RMC ) subsystem ?
113 This paper proposes a new method of access control depiction and the conception of service domain.
114 Usage control is referred to as the next generation method of access control, whose UCON(subscript ABC) model needs perfecting in some key technologies.
115 However, RBAC and GRBAC are difficult to meet dynamic access control requirements because they are essentially established on the static subject-object view.
116 Access Control Lock: Yes the whole system in the implementation of components.
117 As the current M1 card access control systems commonly used by crack, existing access control system security is facing a severe test, so select CPU card is the best means out of this predicament.
118 The methods of describing access control rules and policies under this frame-work are also given.
119 RBAC model is the most popular access control strategy because of its flexibleness, convenience and security.
120 CCNA certification exam necessary manuals, including the following use of these protocols: IP, EIGRP, Serial Line Interface Protocol, Frame Relay, RIPv2, VLAN, Ethernet and Access Control List (ACL).
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
随便看

 

英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。

 

Copyright © 2000-2024 Suppus.net All Rights Reserved
更新时间:2025/3/2 14:09:17