首页 / 词典 / good

acl

  • 网络访问控制列表;前交叉韧带;访问控制表;访问控制;前十字韧带
aclacl
  1. Finally , We introduced ACL mechanism to NFS sever to enhance the security of NFS . The ACL mechanism has fined the access-control granularity of NFS and overcame the flaw of NFS that the access-control granularity of NFS is very coarse .

    最后,在NFS服务器中引入访问控制列表(ACL)机制,该机制细化了NFS的访问控制粒度,从而克服了NFS访问控制粒度过粗的缺陷。

  2. This paper introduces functions and rules of access control list , gives an instance to study how to use ACL in a real network environment , and ends with some advice on network security .

    在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。

  3. Using ACL to realize the system 's safe access control

    用ACL实现系统的安全访问控制

  4. Application of Network Security Management Based on ACL

    基于ACL的网络安全管理的应用研究

  5. The Analysis of Security Programming about Os Access and Control Model Base on ACL

    基于ACL操作系统访问控制模型的安全编程

  6. Let 's illustrate ACL scope using the virtual campus application example .

    下面我们还用虚拟校园应用程序示例说明ACL范围。

  7. Experimental study on PVA and collagen applying to tissue engineering ACL

    聚乙烯醇/胶原共聚物在组织工程前交叉韧带支架材料中的实验研究

  8. Study on the Performance of Bluetooth ACL Link Based on Retransmission

    基于重传的蓝牙ACL链路传输性能研究

  9. Drawing upon ACL to Realize Finely Garden Area Network Control

    利用ACL技术对园区网络实现精细化控制

  10. ACL is main and popular technique of it .

    细粒度的自主访问控制是操作系统安全增强方法中经常采用的技术,访问控制列表(ACL)是其中最主要且流行的技术。

  11. How do I know if I have ACL on a file

    如何知道文件上是否有ACL

  12. And design the ACL valid check algorithm and ACL Access Check Algorithm .

    设计了访问控制表有效性判断策略和访问控制规则检查策略。

  13. Industrial experiment on top - combustion stove of ACL type

    ACL顶燃式热风炉工业性试验

  14. The owner of a file can set their own ACL .

    文件的所有者可以设置自己的ACL。

  15. Performance Evaluation of IL ACL 7000 Coagulation Analyzer System

    ILACL7000型全自动血凝分析系统的性能评价

  16. MRI evaluation revealed 25 normal ACL and 51 abnormal .

    MRI检查共诊断出ACL损伤51例,正常25例。

  17. GSD supports access control lists ( ACL ) based sharing .

    GSD支持基于共享的访问控制列表(ACL)。

  18. This scheme makes use of the control data stream of ACL of the router respectively ;

    本方案分别利用路由器的ACL控制数据流量;

  19. Analysis on Common Troubleshooting of ACL ADVANCE Automatic Coagulation Analyzer

    ACLADVANCE全自动凝血分析仪常见故障处理

  20. Acl : An access control list specification .

    acl:一个访问控制列表规范。

  21. Study of Seafloor Scattering Models based on ACL

    基于声相关计程仪(ACL)的海底散射模型研究

  22. Objective To study the relationship between the cartilage injury and the rupture of ACL .

    目的:研究前交叉韧带(ACL)断裂与关节软骨损伤的关系,初步探讨其损伤机制。

  23. Isometric Feature of Tibial Tunnel Position for ACL Reconstruction Under Load Condition

    负荷条件下前交叉韧带胫骨重建位置的等距特性

  24. The femoral inserted position of ACL reconstruction under loading condition

    负荷条件下前交叉韧带的股骨重建位置

  25. The traditional AC system based on ACL can no longer meet the demands of distributional system .

    传统的基于ACL的资源访问控制机制已经不能很好的适应分布式系统需要。

  26. Enhancing Linux Security with ACL Embedded in it 's Kernel

    用内核ACL增强LINUX的安全性

  27. It is important to set up the ACL to databases with the proper access .

    设置ACL,使之具有适当的权限访问数据库,这非常重要。

  28. Relationship between bone contusion and ACL injury of knee joint

    膝关节骨挫伤与前交叉韧带损伤的相关性研究

  29. Connect internal LAN to external medical insure net using ACL and NAT

    利用ACL与NAT完成内部HIS与外部医保网的对接

  30. 【 Objective 】 To compare the biomechanical nature of ACL in different rebuilding methods .

    【目的】比较不同方法重建前交叉韧带的生物力学性能。