method of access造句
例句與造句
- Searching the method of accessing object in relation environment are of great urgency now
而因,在現(xiàn)有關系系統(tǒng)環(huán)境下尋找對對象訪問的方法已經刻不容緩。 - J2se provides the following two methods of accessing a relational database that has a jdbc - compliant driver
J2se提供以下兩種方法來訪問帶有jdbc兼容驅動程序的關系數(shù)據(jù)庫: - Chapter two discusses the application and realization of odbc and ado , the methods of accessing to database
第二章:主要介紹了通過odbc和ado訪問方式來訪問數(shù)據(jù)庫的使用示例及其相關的實現(xiàn)過程。 - 15 the preferred method of access and egress to a work platform is from a ladder which shall be fitted with an access gate panel
進出工作平臺的優(yōu)選方法是使用一架梯子,梯子上要配備一個進入板門。 - This paper studies the realization of communication and the method of accessing , analyzing and utilizing data acquisition
本文主要研究了饋線自動化系統(tǒng)中通信的實現(xiàn)及對采集數(shù)據(jù)進行存取、分析和利用的方法。 - It's difficult to find method of access in a sentence. 用method of access造句挺難的
- A method of access in which data transfers through input / output channels are made only as and when called for in a user program
一種存取方法,只有當用戶程序提出請求時,才能實現(xiàn)通過輸入輸出通道的數(shù)據(jù)傳輸。 - Electronic banking methods of accessing bank accounts through electronic terminals , atms , computers , land - lines , and mobile phones
電子銀行客戶通過電子終端如自動柜員機、計算機、固定電話線和移動電話操縱銀行賬戶的方式。 - Users security model is put forward . the article mostly researched the method of access to web database using ado and groupware technology of asp
針對ncae系統(tǒng)用戶的訪問特點,建立了安全的用戶訪問模型,以確保系統(tǒng)的安全性。 - Therefore , it might be a good idea to restrict port knocking to situations in which alternative methods of access control are impossible to implement
因此,限定端口敲門于訪問控制的可替代的方法到無法實現(xiàn)的的場合可能是好主意。 - The thesis emphasize further research on both identity identification and authorization access based on role access control . a new identity identification protocol and a new method of access authorization are presented
論文著重對身份認證和基于角色的存取控制授權訪問進行了深入研究,并提出新的身份認證協(xié)議和訪問授權方法。 - Firstly , in this paper , we review the histories of xml and xml database , and all kinds of data models used widely now . then we review traditional access control policies and policies specially used on xml , and present a new expression method of access set on xml based on child tree of w3c data model . and we bring rbac model into xml database and present a new xml access model x - rbac . because the usage of data in databases has high frequency , we present an ids model based on access set density to logging the potential security threats . and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system . finally , we draw a conclusion for this paper and the future work
本文首先回顧了xml及xml數(shù)據(jù)庫的歷史,并總結了目前廣泛使用的xml數(shù)據(jù)模型,在分析了各種傳統(tǒng)數(shù)據(jù)庫訪問控制策略,以及xml的專有訪問控制策略的優(yōu)缺點后,基于w3c的xml數(shù)據(jù)模型,提出了一種基于子樹的具有高彈性的便于實現(xiàn)的的訪問區(qū)域表示法,并將rbac模型引入進來,提出了一種適用于xml數(shù)據(jù)庫的訪問控制模型x - rbac ,同時為了區(qū)分xml數(shù)據(jù)庫訪問中的合法訪問和合理訪問,我們根據(jù)數(shù)據(jù)庫訪問具有頻繁性這一特征,提出了一種基于區(qū)域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日志。 - We characterized the security issues in asp - based networked manufacturing system , especially the issue of the user access control . then the typical methods of access control were introduced , which include discretionary access control ( dac ) , mandatory access control ( mac ) , role - based access control ( rbac ) , task - based access control ( tbac ) , coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on . based on that , we provided an integrated user access control model , which was composed of rbac , tbac , rdac and cbac
本章描述了asp和網絡化制造系統(tǒng)的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、任意訪問控制、基于角色的訪問控制、基于任務的訪問控制,以及基于公司關系的訪問控制、基于企業(yè)聯(lián)盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網絡化制造系統(tǒng)的綜合訪問控制模型,包括網絡化制造系統(tǒng)的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,并定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最后我們給出了以xacml為基礎的網絡化制造系統(tǒng)的訪問控制描述語言。 - The greatest innovation of the system is firstly adopting windows 2000 advanced server which can use the clustering of server as the web server and the sql server 2000 as the database server which is a commercially used database server and many people can visit the same web site in the same time . moreover the page is convenient to updating , administration and maintenance because the content of the dynamic page using the methods of accessing the database ado of asp come from the database
系統(tǒng)中的一個最大的特點就是首次使用了windows2000高級服務器作為web服務器,用sqlserver2000作數(shù)據(jù)庫服務器,其中windows2000高級服務器支持集群技術,而數(shù)據(jù)庫服務器是一種商用的數(shù)據(jù)庫服務器,它可以同時支持成千上萬的用戶同時訪問web站點,而同時用asp技術對數(shù)據(jù)庫進行訪問,產生的是一種動態(tài)網頁,其網頁中的內容基本是數(shù)據(jù)庫中而來,所以頁面的更新非常容易,網頁易于管理和維護。 - With the rapid development of network and database technology , there is great need for different enterprises to share their information , thus the construction of the shared platform of heterogeneous databases was put forward , which mainly makes full use of the existing data resources in every database and offers the method of accessing and cooperating the heterogeneous data
隨著網絡技術和數(shù)據(jù)庫技術的快速發(fā)展,各部門、各行業(yè)的信息迫切需要共享和互操作,異構信息共享交換平臺在這樣的應用背景下孕育而生,旨在充分利用各信息系統(tǒng)已有的數(shù)據(jù)資源,實現(xiàn)不同信息系統(tǒng)數(shù)據(jù)的互訪。 - With the rapid development of new technology , the network and system constructed then will lag behind time . so at the last part of this thesis , the extension and improvement of the system are presented , the method of access to other networks and the construction of intranet are discussed . the model of the regional health management information system is explored and some schemes of implement are also submitted
由于新技術的迅猛發(fā)展,在當時的背景及條件下建立的網絡及系統(tǒng)將逐漸落后于時代,在本論文的最后部分提出了對于該系統(tǒng)的功能擴展和改進,探討了該網絡與其他網絡的互聯(lián),利用本系統(tǒng)及internet構筑企業(yè)內部網nranct ,以及社區(qū)醫(yī)療信息系統(tǒng)的模型等,探討了新技術的應用,提出了一些實現(xiàn)方案,為今后系統(tǒng)的改進提供了一些參考。
更多例句: 下一頁