program access control

英 [ˈprəʊɡræm ˈækses kənˈtrəʊl] 美 [ˈproʊɡræm ˈækses kənˈtroʊl]

【计】程序存取控制

计算机



双语例句

  1. In IMS/ VS, an application program that has access to data bases and OS/ VS data management facilities but does not have access to the IMS/ VS control region or its message queues.
    信息管理系统IMS/VS中的一种应用程序,可以访问数据库和OS/VS数据管理软件但不能访问IMS/VS控制区或它的报文队列。
  2. A secure, easy to configure and manage, independent of program information access control policy is designed by combining RBAC ( role based access control) with PKI ( public key infrastructure).
    该研究结合基于角色的访问控制与公钥基础设施(PKI),设计了一个安全的、易于配置与管理、独立于程序的信息访问控制策略。
  3. Based on the Generic Authorization and Access control Application Program Interface ( GAA-API), the paper presented a method of fine-grained access control for Web pages.
    基于通用的授权与访问控制接口GAA-API,提出了一种网页的细粒度授权与访问控制方法。
  4. Finally, Application program design is realized by hybrid programming with the tools of Visual Basic, Access and MATLAB. It is also showed the result helpful for operating control and economical analysis.
    最后,介绍了应用VISUALBASIC、Access和MATLAB等工具进行编程实现的方法,并展示了研究结果在运行控制和经济分析上的应用。
  5. This paper discusses the judgement and process of program derailment, and presents fault tolerance methods in random access memory, I/ O canal and data in computer real-time control system.
    本文提出了在计算机实时控制系统中,程序飞出的判断及其处理方法;提出了随机存贮器的容错方法,I/O通道的容错方法以及数据的容错方法。
  6. Experimentally confirmed the stability of the main circuit optimization program, the access control system R& D phase.
    通过实验证实了主电路优化方案的稳定性后,进入控制系统研发阶段。
  7. Buffer overflows at run-time can lead to non-deterministic program behavior, which may be used by malicious attackers to compromise a computer, such as to access or corrupt sensitive information, and even worse, to control the computer to attack others.
    程序运行时的缓冲区溢出将导致程序行为异常。恶意用户可以利用服务程序中的缓冲区溢出漏洞,攻击目标计算机系统,窃取或破坏其中的敏感信息,甚至控制该系统向其它主机发动攻击。
  8. Therefore, this program will further learn the migrating instance group authorization and authentication method because the intensity of location trust will influence the security level of access control.
    因为位置互信强度会影响访问控制的安全水平,所以,本课题将进一步研究迁移实例群授权及其鉴权方法。
  9. The program and its modules achieve Policy-based network access control terminal thinking, of which two-factor authentication mechanisms, technologies of terminal authorization and Strategy deployment have important practical significances for enriching the means of security control of the network.
    基于策略的内网终端访问控制思想,其中双重认证机制、终端策略授权和部署技术,对丰富内网安全的控制手段,具有重要实践意义。