您要查找的是不是:
- Research and Implement of Master-Slave Pattern Based Security Model for Mobile Agent 基于主从样式的移动代理安全模型的研究与实现
- The security model of IIS is at fault here. IIS的安全模型这里有毛病。
- The Research of Encrypted Circuit Construction Based Secure Model for Mobile Agent 基于加密电路构造的移动代理保护安全模型的研究
- The value of Hanyu Pinyin is in its large user base. 汉语拼音的价值就是在于有很多人在用。
- A uniformly congruent security model is presented based on observational congruence. 基于观察同余等价;构造了一类一致同余安全模型.
- In computer security, a security model rule stating that once an object is made inactive it cannot be accessed until it is made active again. 计算机安全学中,一条安全模型规则,即一客体在被置为不活动后,不能被访问,直至又被置为活动。
- In this dissertation the integrated and privilege-role extended UNIX operating system security model, which is based on the BLP model, is discussed. 在对BLP模型进行分析的基础上,提出了以BLP模型为基础的完整性和特权角色扩展的UNIX操作系统安全模型。
- Does your application support a particular security model? 您的应用程序是否支持特殊的安全模型?
- Then we give a systemic description of the BLP Security Model. 第五章详细讨论了BLP安全模型,在理论上对Linux系统安全作了抽象提高与总结;
- The NT security model is MOSTLY able to reproduce the POSIX model. NT安全模组大多数能再生产POSIX模组。
- The author construct a security model of engineering drawings management,including user authentication,the security protocol in storage of drawings files and XML access control. 在分析现有类似系统的不足及工程图档设计工作流后,构造了基于XML的工程图档管理安全模型,分用户认证、图档存储安全协议和基于XML的存取控制三个相关联的方面来实现。
- Finally, adaptive modulation is applied to each sub-channel of the selected user based on the BER constraint. 最后,在满足一定误码率的条件下,对期望用户的子信道进行自适应调制。
- Then came the World Wide Web and the dramatic expansion of the Internet user base. 后来出现了环球网(简称www),互联网用户群急剧扩张。
- The paper proposes a dynamic multilevel security model based on belief, which integrates the belief mechanism and multilevel security model. 把信任机制与多级安全模型相结合,提出了一种信任动态多级安全模型。
- This paper proposed a method to realize JAAS based security for the EJB container of J2EE application server. 本文提出在J2EE应用服务器EJB容器中基于JAAS安全机制的一种实现方式。
- Our extremely large user base, combined with our bug tracking system ensures that problems are found and fixed quickly. 我们大的使用者群与臭虫追踪系统的结合可以确保问题被及时发现和修复。
- PKI based security multicast not only may manage key effectively, but also have favourable expansibility. 另外,本节提出多播数据传输的扩散算法,减小系统的资源耗费。
- This script looks up the user's password in a table called user_pwd_table and authenticates the user based on that password. 该脚本在名为user_pwd_table的表中查找用户的口令,并根据该口令鉴定用户。
- You need more sophisticated programmability or a different security model. 您需要更成熟的可编程性或不同的安全性模型。
- As broadband access continues to grow, IPTV market is having a significant user base. 随着宽带接入的不断普及,IPTV将拥有更过广阔的用户基础。