快好知 kuaihz


access control造句
61 Assigns access rights to the queue based on the contents of an access control entry. 62 To solve low channel utilization problem caused by long propagation delay in wireless networks, a fast reservation on-demand transmission (FRODT) medium access control (MAC) protocol is proposed. 63 On study of Role-Based Access Control(RBAC)model and Generalized Framework for Access Control(GFAC), the generalized model for access control based on RBAC and GFAC was presented. 64 Especially in-depth study the communication mechanism between services, the access control service and traffic statistics service, given the corresponding design models and test results. 65 Using the NOT operator, further restriction can be placed on access control. 66 S-MAC is a medium access control protocol based on competition for wireless sensor network. 67 Multilevel security requires additional mechanisms for enforcing mandatory access control that prevents the establishment of a signaling channel and prevents unauthorized disclosure of information. 68 To provide reliable and guaranteed services for these applications, priority scheduling in the medium access control (MAC) layer is one of the key issues. 69 So this paper presents a design which use the combination of RFID technology and face recognition technology for identity verification in access control system. 70 Gets flags that specify the inheritance properties of this Access Control Entry (ACE). 71 It includes mandatory access control built on top of the Flux Advanced Security Kernel (Flask) security architecture, including type enforcement and multilevel security (MLS), all as plug-in modules. 72 The CX600 can act as Multi Service Edge (MSE) to implement access control and management of DHCP, IPoE, and leased line subscribers. 73 One method to satisfy the access authority on file access is to implement an access control list (ACL). 74 Access control is the component of the e-commerce application that determines whether a given user can perform a given action on a given resource. 75 How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented. 76 The inherited access control list ( ACL ) or access control entry ( ACE ) could not be built. 77 It provided support of secure remote login, the secure file transfer, the access control and the port forwarding. 78 The three-handshake broadcast protocol(THBP) was introduced as a single channel synchronous media access control protocol for multi-hop wireless networks. 79 For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview. 80 File security access control is the core of the bank automatic teller machine security. 81 In order to resolve the problem of unsatisfied quality of service in intelligent building Web, an industry Web design of intelligent building based on medium access control protocol is presented. 82 Using black-box model to describe workflow system with local dynamic to illustrate the state-based dynamic access control. 83 Finally, check point and access control was used for tolerance and security of the system. 84 Database NotesACL Represents a collection of all the access control list entries for a database. 85 Access control is one of the most important problems of grid computing. The aim of grid access control is to apply the authorization police in heteroid and dynamic environment. 86 In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation. 87 A weighted role for activating task and periodic time authorization is an unsolved major problem for the access control of a workflow management system (WfMS). 88 The index in the array at which to begin copying the access control list entries. 89 Realm Write Operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control. 90 Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.