单词 | access rules | ||||||||||||||
释义 | access rules
更多释义 收起释义 例句释义: 访问规则,访问策略,存取规则 1. As you define more access rules for your application, roles become a more convenient way to apply the changes to groups of users. 为应用程序定义的访问规则越多,使用角色这种方法向用户组应用更改就越方便。 msdn2.microsoft.com 2. Therefore, you need to create some access rules that determine which roles have access to which folders. 因此需要创建一些访问规则,确定哪些角色能够访问哪些文件夹。 msdn2.microsoft.com 3. Removes all access rules that contain the same security identifier and access mask as the specified access rule from the DACL of an object. 从对象的DACL中移除所有安全标识符和访问掩码与指定的访问规则相同的访问规则。 msdn2.microsoft.com 4. The DB2 LBAC approach is to allow users to define the set of components that make up a security label and to specify the access rules. DB2LBAC方法是允许用户定义一组组件,以构成一个安全标签,并允许用户指定访问规则。 www.ibm.com 5. When a NetCodeGroup is created, it contains the default connection access rules shown in the following table. NetCodeGroup创建后将包含下表所示的默认连接访问规则。 msdn2.microsoft.com 6. Gets or sets a Boolean value that specifies whether the access rules associated with this ObjectSecurity object have been modified. 获取或设置一个布尔值,该值指定与此ObjectSecurity对象关联的访问规则是否已被修改。 msdn2.microsoft.com 7. Therefore, pages must be restricted by using access rules (allow and deny elements) for security trimming to work. 所以,必须使用访问规则(allow和deny元素)限制页面,才能使安全性调整起作用。 msdn2.microsoft.com 8. Server runtime is made up of the class libraries and their access rules for a specific type and version of server. 服务器运行时由类库及其对特定类型和版本的服务器的访问规则。 www.ibm.com 9. A null reference to a DACL allows any user to add access rules to an object, potentially creating a denial-of-service attack. 对DACL的空引用使得任何用户都可以向对象添加访问规则,这就有可能产生拒绝服务攻击。 msdn2.microsoft.com 10. Was the difference in implicit default access rules really the motivation? 隐式默认访问规则的差异真的是动机所在吗? msdn2.microsoft.com 1. Gets a Boolean value that specifies whether the access rules associated with this ObjectSecurity object are in canonical order. 获取一个布尔值,该值指定与此ObjectSecurity对象关联的访问规则是否处于规范顺序。 msdn2.microsoft.com 2. But some experts point out the lack of such "open access" rules for telephone and cable companies. 但是,一些专家指出电话公司和有线电视公司缺少此类“公开获取”的规定。 www.unsv.com 3. User accounts and roles that you create are stored in the database and access rules are stored in the Web. Config file. 创建的用户帐户和角色存储在数据库中,而访问规则存储在Web.config文件中。 msdn2.microsoft.com 4. The primary purpose of establishing roles is to provide you with an easy way to manage access rules for groups of users. 建立角色的主要目的是为您提供一种管理用户组访问规则的便捷方法。 msdn2.microsoft.com 5. Gets a collection of the access rules associated with the specified security identifier. 获取与指定的安全性标识符关联的访问规则的集合。 msdn2.microsoft.com 6. Access rules can be divided into two categories: read access rules and write access rules. 访问规则可以划分为两类:读访问规则和写访问规则。 www.ibm.com 7. Read access rules are applied when a user attempts to read labeled data. 当用户试图读带安全标签的数据时,则应用读访问规则。 www.ibm.com 8. Gets the Type of the object associated with the access rules of this ObjectSecurity object. 获取与此ObjectSecurity对象的访问规则关联的对象的Type。 msdn2.microsoft.com 9. IDS has a predefined set of read and write access rules that are collectively called IDSLBACRULES. IDS有一组预定义的读和写访问规则,它们被统称为IDSLBACRULES。 www.ibm.com 10. Write access rules are applied when a user attempts to insert, update, or delete labeled data. 当用户试图插入、更新或删除带安全标签的数据时,则应用写访问规则。 www.ibm.com 1. Removes all access rules that exactly match the specified access rule from the DACL of an object. 从对象的DACL中移除所有与指定的访问规则完全匹配的访问规则。 msdn2.microsoft.com 2. A few default types always exist with clearly defined access rules. 通常存在一些带有明确定义的访问规则的默认类型。 www.ibm.com 3. If any of the access rules are violated, the user is denied access to data. 如果违反任意一条访问规则,则拒绝用户访问数据。 www.ibm.com 4. The access rules can be used to allow or deny access to URLs within your application based on user names and roles. 利用这些访问规则可以根据用户名和角色允许或拒绝对应用程序中对URL的访问。 msdn.microsoft.com 5. Apply access rules to links that are displayed in the navigational structure of your Web site. 将访问规则应用于在网站的导航结构中显示的链接。 msdn2.microsoft.com 6. How do we handle these ad hoc interactions, secure them, and provide a flexible method for applying access rules? 如何处理这些特别的交互,保证它们的安全并提供一个应用访问规则的灵活方法? www-128.ibm.com 7. You can set up such access rules in the authorization Element (ASP. NET Settings Schema) section of the Web. Config file. 可以在Web.config文件的authorization元素(ASP.NET设置架构)部分中设置此类访问规则。 msdn2.microsoft.com 8. With the Security tab, you manage user accounts, roles, and access rules for the Web site. 使用“安全”选项卡,可以管理用户帐户、角色和网站的访问规则。 msdn2.microsoft.com 9. Sets or removes protection of the access rules associated with this ObjectSecurity object. 设置或移除与此ObjectSecurity对象关联的访问规则的保护。 msdn2.microsoft.com 10. Sets or removes protection of the access rules associated with this. 对象关联的访问规则的保护。 msdn2.microsoft.com 1. n Note Extension methods don't let you break through the access rules that classes define for their methods, fields, and properties. 扩展方法并不让你突破类为它的方法、字段、和属性定义的访问规则。 www.bbsmvc.com 2. Firewall and other access rules that will prevent the use of unsupported network protocols in a grid application. 防火墙和其他访问规则可能不允许在网格应用程序中使用它们不支持的网络协议。 www-128.ibm.com 3. Select this check box to enable role management to manage access rules for groups of user accounts. 选择此复选框可以启用角色管理,以便管理用户帐户组的访问规则。 msdn2.microsoft.com 4. Removes all access rules associated with the specified IdentityReference. 移除与指定的IdentityReference关联的所有访问规则。 msdn2.microsoft.com 5. LBAC write access rules are enforced while merging into the target table. LBAC编写的访问规则会在合并到目标表的过程中执行。 www.ibm.com 6. It has been devising market-access rules that favour state firms. 国家正在制定有利于国企的市场准入制度。 www.bing.com 7. LBAC read access rules are enforced while reading from both source and target tables. 在从源表及目标表读取数据的过程中,LBAC读取访问规则被执行。 www.ibm.com 8. LBAC read access rules are enforced while reading from source table, however. 然而,在从源表读取数据期间,LBAC读取访问规则被执行。 www.ibm.com 9. You are not allowed to access the requested page based on firewall web access rules. 基于防火墙的网页访问策略,你的访问被拒绝。 www.isacn.org 10. We will deepen reform of the investment system and improve and strictly enforce market access rules. 深化投资体制改革,健全和严格市场准入制度。 blog.tianya.cn 1. However, a loosening of market access rules is expected to occur in the coming years. 然而,在未来几年里,市场准入规则预计将不断放宽。 www.ftchinese.com 2. Action is taken if this condition is not met, as denoted in the access rules. 如果此条件不满足,就会按照访问规则采取行动。 www.ibm.com 3. contains the allowed access rules and hosts. deny contains the denied rules. 通常情况下,hosts.allow包含允许访问的规则,而hosts.deny包含拒绝访问的规则。 www.ibm.com 4. If you want to restrict access to static files, configure access rules for those files in IIS. 如果要限制对静态文件的访问,请在IIS中配置这些文件的访问规则。 msdn2.microsoft.com 5. Exemptions provide a way to allow users to bypass one or more access rules for a security policy. 豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。 www.ibm.com 6. Gets the type that the RegistrySecurity class uses to represent access rules. 获取RegistrySecurity类用于表示访问规则的类型。 msdn2.microsoft.com 7. Replaces all access rules in DACL of an object. 在对象的DACL中替换所有访问规则。 msdn2.microsoft.com 8. The security identifier for which to remove access rules. 要为其移除访问规则的安全性标识符。 msdn2.microsoft.com 9. Replaces access rules in the DACL of an object. 在对象的DACL中替换访问规则。 msdn2.microsoft.com 10. Additionally, access rules might no longer work in the way that you configured them. 此外,访问规则可能将不再以配置的方式工作。 msdn2.microsoft.com 1. Property and return the type they use to represent access rules. 属性,并返回用于表示访问规则的类型。 msdn2.microsoft.com 2. You must also create some Web pages that will allow you to test the access rules you have created. 还必须创建一些网页,以便测试已创建的访问规则。 msdn2.microsoft.com 3. You can configure access rules that display or hide a link in your navigation menu. 您可以配置用于在导航菜单中显示或隐藏链接的访问规则。 msdn2.microsoft.com 4. To work with role management, you first enable it and optionally configure access rules that can take advantage of roles. 若要使用角色管理,首先要启用它,并配置能够利用角色的访问规则(可选)。 msdn2.microsoft.com 5. Develop urban low-carbon economy. We should first consider the market access rules of establishing of "pure electric car" . 发展城市低碳经济,应该首先考虑建立“纯电动汽车”市场准入规则。 blog.sina.com.cn 6. To change the access rules of only certain child files or folders, you must break your operation into several different calls. 若要只更改特定子文件或文件夹的访问规则,必须将操作拆分为若干不同的调用。 msdn2.microsoft.com 7. After you have established roles, you can create access rules in your application. 建立角色后,可以在应用程序中创建访问规则。 msdn2.microsoft.com 8. So more and more countries' banking laws focus market access rules for transactional banks. 因此,各国银行法律制度都对跨国银行的市场准入问题给予了较多的关注。 paper.pet2008.cn 9. Write access rules are applied when data is written (INSERT, UPDATE, and DELETE operations) and can be summarized as follows 当用户写数据时(INSERTUPDATE和DELETE操作),则应用写访问规则,写访问规则可总结如下 www.ibm.com 10. The read access rules are applied when data is read (SELECT, UPDATE, and DELETE operations) and can be summarized as follows 当用户读数据时(SELECT、UPDATE和DELETE操作),则应用读访问规则,读访问规则可总结如下 www.ibm.com 1. The Access Rules and Regulations of the Press and Publication Market: Review and Assessment 新闻出版市场准人规制:共时考量与简要评析 ilib.cn 2. If the access rules are in canonical order; otherwise, 如果访问规则处于规范顺序,则为, msdn2.microsoft.com 3. To set up access rules for the MemberPages subdirectory 设置MemberPages子目录的访问规则 msdn2.microsoft.com 4. To set up access rules for the site folders 设置站点文件夹的访问规则 msdn2.microsoft.com 5. For more information about access rules, see 有关访问规则的更多信息,请参见 msdn2.microsoft.com 6. Create access rules with objects 使用对象来建立存取规则 www.domainnet.com.cn |
||||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。