storage access control

英 [ˈstɔːrɪdʒ ˈækses kənˈtrəʊl] 美 [ˈstɔːrɪdʒ ˈækses kənˈtroʊl]

【计】存储器存取控制

计算机



双语例句

  1. The life cycle management of Web content covers creation, publication, storage, search/ retrieval, access control, and content integration.
    Web内容的生命周期管理包括创建、发布、存储、搜索/检索、访问控制和内容集成。
  2. Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists ( ACLs).
    GoogleStorage是值得花大精力的,这主要是因为它支持通过访问控制列表(ACL)实现的强大访问控制。
  3. Storage access control unit
    存储器访问控制部件
  4. Sitting on top of the data storage, JCR offers content services like granular access control, versioning, content events, full-text search and filtering among others.
    在数据存储之上,JCR提供诸如访问粒度控制、版本控制、内容事件、全文检索和过滤等内容服务。
  5. Two optional storage methods, which included memory storage and disk storage, were presented to satisfy with the access demand of APC ( Advance process control) software.
    结合先进控制软件对历史数据的不同访问需要,提出了内存历史数据库和磁盘历史数据库两种可选数据存储模型。重点研究了磁盘历史数据库高效的存储和查询方法;
  6. A unified access control platform is presented, which is Web information system oriented and Web service based. This platform implements centralized storage, distributed management of user's information and unified access control.
    提出了一种基于Web服务的面向Web应用集成的统一授权平台,该平台用于实现用户信息的集中存储和分布管理,以及统一的访问控制管理。
  7. This paper analyzed critical technology: heterogeneous data fusion based on XML, remote sensing data storage, data persistence and user access control;
    对基于XML的多源异构数据融合、遥感数据存储、数据持久化以及用户访问控制技术进行了分析和设计;
  8. Having analyzed the organization and storage structure of the metadata in DM_OLAP, we use the three technologies of role based access control, version control in engineering database and lazy two-step data synchronization to solve these problems.
    在分析DMOLAP元数据的组织和存储结构的特点的基础上,采用基于角色的访问控制、工程数据库版本控制和懒惰的两步式数据同步法等技术来解决上述问题。
  9. Its functions are to acquire and process real-time data, storage and browse historical data, alarm and display fault information, especially control sophisticated industrial plants. The running platform has an OPC Server inside, which makes the access and remote control of the system convenient.
    运行平台是交互式的图形用户界面,具有数据实时采集处理、历史数据存储和浏览、报警显示和对复杂工业对象的远程控制等功能,并内嵌OPC服务器,便于对系统进行远程访问和控制。
  10. In this paper, we investigate the neutral storage, query, and access control method of the feature structure and information based on feature modeling technology.
    以零件特征造型技术为基础,研究特征结构和信息的中性存储、查询和权限控制方法;
  11. However, the current applications propose a higher request to the security of the network storage. The object-based storage storage has only provided the access control mechanism based on object attribute merely, and has not been able to consider its whole security from the system angle.
    然而,当前应用对存储网络的安全性提出了更高要求,已有的基于对象接口的网络存储系统仅仅提供了对象属性访问控制的安全机制,未能从系统的角度考虑其整体的安全性。
  12. We propose a KP-ABE based cloud storage access control scheme based on a trusted third party authority.
    我们基于可信第三方授权机构提出了一个基于KP-ABE的云存储访问控制方案。
  13. Application layer software mainly to achieve some kind of human interaction, such as patient information input, data storage, case generation, database access and the corresponding control operation.
    应用层软件主要实现一些人机交互操作,例如病人信息的输入、数据的保存、病例的生成、数据库的访问以及相应的控制操作。
  14. This kind of access control technology for USB storage devices uses access control framework for Linux kernel resources, realize access control to USB storage devices.
    这种USB存储设备访问控制技术利用对Linux内核资源的访问控制框架,实现对USB存储设备的访问控制。
  15. Most storage systems have serious security flaws, because these data were mainly protected through the operating system access control mechanisms. If you bypass the operating system and access the storage devices physically, you can freely access the data.
    大多数存储系统都有严重的安全缺陷,因为数据主要是通过操作系统的访问控制机制来进行保护,用户只要绕过操作系统,物理上接触存储设备,就能随意访问这些数据。
  16. XML is a new technology for information exchange, storage and retrieve. Some mechanisms are needed to protect sensitive information stored in XML documents, and access control is one of the mechanisms.
    XML是目前信息交换和存取的新兴技术,而XML文档中的敏感信息需要各种机制来保证其安全性,访问控制是其中之一。
  17. In order to ensure the security, efficiency, ease of use of data storage, this paper adopts role-based access control mechanisms to improve access performance and designs the role of the distribution module program.
    为保证数据存储的安全、高效、易用性,本文采用基于角色的访问控制机制提高存取性能,并设计了角色分配模块方案。
  18. XML is widely used as a prevalent standard of data exchange and storage over Internet. Some mechanisms are needed to protect the confidentiality of privacy data stored in XML database, and access control is one of the mechanisms.
    XML作为Internet中新兴的数据交换标准和重要的数据存储方式受到了广泛的应用,而XML数据库中的隐私数据需要各种机制来保证数据的隐私性,访问控制是其中之一。
  19. To protect the cryptographic service system and improve the expansion of algorithms, the keys storage structure, algorithm setting and usage structure, file system access control mechanism and power-fail protection mechanism are realized.
    为了保证密码服务系统安全性,提高其算法拓展功能,实现了密钥存储结构、算法设置及使用结构、系统访问控制机制以及文件系统掉电保护机制。
  20. The system can carry out integrated storage, network sharing and multi-user concurrent access to various data of planning area, possess the characteristics of rapid access, timely update and so on, and provide a technical support on efficient and scientific decision-making of flood control planning.
    该系统实现了对规划区各类数据的一体化存储、网络共享、多用户的并发访问,具有数据存取便捷、更新实时等特点,为防洪规划部门的高效、科学决策提供了技术支持。
  21. The security of storage includes secure authentication, access control, security of dynamic data and static data.
    存储系统的安全性主要有以下几个方面:安全认证、访问控制、动态数据安全性和静态数据安全性。
  22. Analysis role-based access control and combine right control demand of each position of oil storage, it expands the basic functions of RBAC and realizes fine-grained access control function of quadratic assignment.
    分析基于角色的访问控制RBAC,结合油库各岗位的权限控制需求来对基本RBAC的功能进行扩展,提出一种改进的权限管理模型,可实现二次权限分配的细粒度权限控制功能。
  23. Encryption and authentication technique is an effective method to ensure storage security, which can be used to realize the storage encryption and access control of electronic documents.
    加密和身份认证是保证存储安全的有效手段,实现电子文档的加密存储和访问控制。
  24. With the concerns on data security increases, the data owner want a safe manner to entrust the data storage in proxy servers, and want to manage the users visit permissions by access control strategy.
    随着用户对数据安全的关注增多,数据拥有者希望采用安全的方式将数据进行代理服务器的委托存储,并通过权限控制实现对用户的访问管理。
  25. Specifically, it can through processing the summary of transmission data, to verify the integrity of data in the transmission or storage process. ( 3) Log management solution of monitoring user behavior and access control scheme of user access authority control is implemented.
    其中,通过对传输数据摘要的处理,以验证数据在传输或存储过程中的完整性。(3)设计并实现了监测用户行为的日志管理和控制用户访问权限的访问控制方案。