distributed access
英 [dɪˈstrɪbjuːtɪd ˈækses]
美 [dɪˈstrɪbjuːtɪd ˈækses]
网络 分布式存取; 分散式存取
双语例句
- Based on SPKI technology, proposing multicast distributed access control system: MDAC, as wall as, proposing a delegation certificate path ( DCP) searching algorithm based on binary tree.
基于SPKI技术提出了组播分布式访问控制系统MDAC,并提出了基于二叉授权委托树的委托证书路径(DCP)查找算法。 - Propose a policy enforcement attestation approach which extends traditional remote attestation, so that the problem of trust establishment on the policy enforcement behavior of the terminal platform is solved and makes the distributed access control architecture more provable.
提出一种基于行为的使用控制策略执行证明方案,扩展了传统的远程证明,解决了策略执行行为的信任建立问题,增强了分布式访问控制架构的可验证性。 - Research of the Cache System in a Distributed Access Environment
分布访问环境中的数据缓存体系研究 - For the history data management component, we define the service interface of the components using the CORBA IDL; implement historical data storage based on Oracle Berkeley DB; support distributed access using CORBA Trading Service.
在历史数据管理组件中,使用CORBAIDL(接口定义语言)定义了组件的对外服务接口;基于OracleBerkeleyDB实现历史数据存储;基于CORBA交易服务实现对分布式访问的支持。 - According to the whole design scheme, this system adopt the opening distributed structure, and the repository was designed as a opening management flatform so as to the expert system has a character of opening and distributed access.
根据总体设计方案,开放式知识库故障诊断专家系统采用开放分布式结构,知识库被设计成一个开放式的知识库管理平台,使得整个专家系统具有良好的开放性以及分布式访问的特征。 - Distributed Access Control for Remote User
远程访问中的分布式访问控制 - It also describes the configuration, functions and working pattern of the application framework and n layers distributed access logic model of the application framework.
给出了应用框架的组成结构和功能设计,论述了模型的n层分布式逻辑访问模型。 - The Design and Implementation of a Distributed Access Control System Based on Trust-Management
一个基于信任管理的分布式访问控制系统的设计与实现 - A distributed access control model for peer-to-peer networks
一种Peer-to-Peer环境下的分布式访问控制模型 - As far as I know, it is the first tentative research on this trust evaluation mechanism and its application in distributed access control based on trusted computing.
据我所知,该信任评估方案及其在基于可信计算的分布式访问控制中的应用研究,尚属首次。