网站首页  词典首页

请输入您要查询的英文单词:

 

单词 ACL
释义

ACL

  • 网络访问控制列表(Access Control List);访问控制表;前交叉韧带(anterior cruciate ligament)
1.
访问控制列表(Access Control List)
访问控制列表(ACL)配置实验报告访问控制列表(ACL)配置实验报告隐藏>>你可能喜欢 文档信息 ljyilyly3贡献于2010-11-19 贡献 …
wenku.baidu.com
2.
访问控制表
访问控制表:每个客体都有一张访问控制表ACL),记 录该客体可被哪些主体访问以及访问的形式。主体访问 控制表可以决 …
www.docin.com
3.
前交叉韧带(anterior cruciate ligament)
·前交叉韧带(ACL)重建后跑步和剧烈运动的时机问题·余家阔教授做“膝关节前交叉韧带(ACL)双束重建的临床研究”的专题报告 · …
www.haodf.com
4.
前十字韧带
前十字韧带(ACL)重建术的材料选择前十字韧带(ACL)重建术的材料选择[科技·前沿]Kristofer D.. 全部>> 卿本佳人 热度: 浏览:…
www.docin.com
5.
抗心磷脂抗体
抗心磷脂抗体ACL) ACL作为抗磷脂综合征中的重要自身抗体,ACL阳性往往提示易发生动、静脉血栓形成,脑血管意外发 …
zhidao.baidu.com
6.
存取控制清单
表示存取控制清单 (ACL),且为 DiscretionaryAcl 和 SystemAcl 类别的基底类别。CommonAcl 型别会公开下列成员。
msdn.microsoft.com

例句

释义:
1.
If you're using any other backup program, be sure to do a bit of research before using extended attributes and ACLs all over the place.
如果您正在使用任何其它备份程序,请确保无论在何处使用扩展属性和ACL之前都做一些研究。
www.ibm.com
2.
Beijing Guoan contested the group stage of the ACL this year and are in a strong position to qualify for the tournament for a second time.
北京国安队有争议的小组赛阶段的ACL,今年正处于强有力的地位,以资格赛第二次。
tieba.baidu.com
3.
However, when referring to the feature found in the ACL of every Notes database, we bracket the word to distinguish it: [roles].
但是,谈及在每个Notes数据库的ACL中显示的特性时,将使用[role]以示区别。
www.ibm.com
4.
User ACL rights can be administered from here. However, up to now it is only possible to revoke user rights in the admin application.
用户的日历权限可以在这里被设置。到现在,只有从系统管理应用程序中才又可能撤销这些用户权限。
blog.sina.com.cn
5.
Therefore, it may be necessary to modify the ACL of those attributes to allow computer lists to read these added attributes.
因此,可能需要修改这些属性的ACL,以便使电脑列表能够读取这些添加的属性。
docs.info.apple.com
6.
Because these objects are used in public folder access control lists (ACLs), it is crucial that this information be replicated correctly.
由于这些对象是在公用文件夹访问控制列表(ACL)中使用的,因此,正确复制此信息是至关重要的。
technet.microsoft.com
7.
Conclusion: The SF is one of holpful seed cells to be used for constructing tissue engineering ACL.
结论:皮肤成纤维细胞可作为构建组织工程前交叉韧带的较为理想的种子细胞选择。
www.ceps.com.tw
8.
Access Control List (ACL): An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(ACL):ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
www.ibm.com
9.
An attempt to add a resource account to an Access Control List (ACL) failed because resource accounts do not have associated user accounts.
试图将资源帐户添加到访问控制列表(ACL)失败,因为资源帐户没有相关联的用户帐户。
www.microsoft.com
10.
Each S3 object has an access-control list (ACL) associated with it that explicitly identifies the grants and permissions for that resource.
每个S3对象有一个相关联的访问控制列表(ACL),ACL显式地指定此资源的授权。
www.ibm.com
1.
If your favorite sport involves pivoting or jumping, a proper training program can help you to reduce your chances of an ACL injury.
如果你最爱的运动中有旋转和跳跃的动作,合适的训练项目能帮助你降低发生ACL损伤的几率。
www.bing.com
2.
You may recall that retrieving and persisting ACL bitmaps was an initial maintenance and database portability concern.
您可能记得,检索和保持ACL位图是考虑到初始的维护和数据库可移植性。
www.ibm.com
3.
While ACL injuries can be treated with surgery and physical therapy, a way to prevent them is to build up the strength of your hamstrings.
前十字韧带受伤可以通过手术治疗和物理疗法,采用一种防止受伤的方法是增强脚部肌腱的力量。
www.bing.com
4.
It contains the names of principals and the access permissions followed by an optional principal that the ACL applies.
它包含主体的名称和访问权限,然后是一个可选的用于ACL的主体。
www.ibm.com
5.
Recently, many computer navigation systems have been developed for arthroscopic reconstruction of the anterior cruciate ligament(ACL).
近年来,多种计算机导航系统已经被开发用于关节镜下的前交叉韧带重建手术。
en.zglckf.com
6.
The passed ACL did not contain the minimum required information.
传送的ACL不包含最低要求的信息。
www.drados.com
7.
For failover cluster installations, resources on shared disks cannot be set for any ACL in a local user group.
对于故障转移群集安装,不能为本地用户组中的任何ACL设置共享磁盘上的资源。
msdn2.microsoft.com
8.
Once done, use aclput to put the ACL definition into the files you wish to copy in the ACL attributes.
完成之后,使用aclput把ACL定义复制到希望复制ACL属性的文件。
www.ibm.com
9.
If the delegate has Designer or Manager ACL rights, he only needs to have rights to run restricted agents.
如果委托方拥有Designer或ManagerACL权限,则他只需拥有运行受限代理时所需的权限。
www.ibm.com
10.
An unknown user (sometimes referred to as a zombie user) is a user that is listed in an ACL, but that does not have an account.
未知用户(有时称为僵用户)是在ACL中列出但没有帐户的用户。
technet.microsoft.com
1.
In this example, we see that the file probe_sys has ACL enabled on that file but probe_sys. sh does not.
在这个示例中,可以看出probe_sys文件上启用了ACL,但是probe_sys.sh没有。
www.ibm.com
2.
Each entry in the ACL's list of permissions grants a set of permissions on the resource to a principal or group.
ACL的权限列表中的每个条目将资源上的权限集授予一个主体或组。
www.ibm.com
3.
A number of intrinsic and extrinsic risk factors have been proposed to account for the sex difference in the incidence of ACL injuries.
一些内在和外在风险因素已建议考虑到性别差异的发病率韧带受伤。
www.syyxw.com
4.
Each of these resources has several classes that you can use to create and modify ACLs.
上述每个资源都有几个用于创建和修改ACL的类。
msdn2.microsoft.com
5.
Describes the rules used to propagate ACLs to folders and files contained within a target folder.
描述用于将ACL传播到目标文件夹中包含的文件夹和文件的规则。
msdn2.microsoft.com
6.
The scope of the relationships in a given instance of one of the inner classes is a single ACL.
这些内部类之一的给定实例中的关系的范围是单个ACL。
www.ibm.com
7.
However, an anatomically centered femoral tunnel will align the ACL graft horizontally and away from the compression of the femoral notch.
但位于解剖中心的股骨隧道会使得移植和前叉韧带呈水平位,并能避免股骨切迹的压迫。
opoadoc.net
8.
As noted previously, the mail file owner must have at least Author access in the ACL of Admin4. nsf.
正如前面提到的,邮件文件所有者必须至少拥有Admin4.nsf的ACL中的Author权限。
www.ibm.com
9.
Unlike the ACL component discussed in Part 2, the Sanitize component is included by adding a line to the top of your controller.
与第2部分中讨论的ACL组件不同,只在控制器的顶部添加一行代码即可包含Sanitize组件。
www.ibm.com
10.
Conclusion ACL is an important structure for maintaining the anteroposterior stability of the knee joint.
结论ACL是维持膝关节前后稳定的重要结构。
www.zggszz.com
1.
ACL scope has some interesting and useful implications, even in the relatively simple and standard case of file systems.
甚至在文件系统的相对简单的标准情况中,ACL范围包含某些有趣的有用含意。
www.ibm.com
2.
You can then extend the scope of the building's ACL to include all public spaces associated with the building in the application.
然后可以将大楼的ACL范围扩展,以便在应用程序中包括与大楼关联的所有公共空间。
www.ibm.com
3.
One of the AccessControlSections values that specifies the type of access control list (ACL) information to receive.
AccessControlSections值之一,它指定要接收的访问控制列表(ACL)信息的类型。
msdn2.microsoft.com
4.
Much of the main work of organizing a presentation of ACL relationships goes on in these inner classes.
组织ACL关系的表示形式的主要工作大部分都是在这些内部类中进行的。
www.ibm.com
5.
Thus, the system can examine the subject's identities and the ACL of the resource, and if a match is found, permit the access specified.
这样,系统就能检查主体的身份以及资源的ACL了。如果找到匹配信息,就允许指定的访问。
www.ibm.com
6.
The server can impersonate the client for access control list (ACL) checking , but it cannot access system objects as the client .
服务器可以模拟客户端进行访问控制列表(ACL)检查,但不能作为客户端访问系统对象。
www.bing.com
7.
This review summarized the researches on non-contact ACL injury characteristics, ACL loading and its injury mechanisms.
本文综述了国内外对前交叉韧带损伤特点及其受力和损伤机制的研究结果。
www.ceps.com.tw
8.
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由ACL(AccessControlList)保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
www.ibm.com
9.
This is the interface used for representing one entry in an Access Control List (ACL).
该接口用来表示访问控制列表中(ACL)的一个入口。
www.51goushu.com
10.
An accelerated course for rehabilitation after ACL reconstruction was published in the American Journal of Sports Medicine.
对于ACL重建后的康复的加速课程被刊登在杂志美国运动医学。
blog.sina.com.cn
1.
The delegate must be included in the ACL of the database with Editor-, Designer-, or Manager-level rights.
委托方必须包含在数据库的ACL中,使用Editor-、Designer-或Manager-级的权限。
www.ibm.com
2.
Modifies the user access control list (ACL) and displays authorization settings for an item under version control .
修改用户访问控制列表(ACL)并显示受版本控制的项的授权设置。
www.bing.com
3.
NET automatically checks the ACL for each . aspx page requested and denies the request if the caller lacks permission to read the file.
NET会自动为请求的每个.aspx页面检查ACL并拒绝没有读取文件权限的调用者的请求。
blog.sina.com.cn
4.
Proper placement of the femoral tunnel in ACL reconstruction is key to restoring translational and rotational stability to the knee.
恢复膝关节的平移和旋转的稳定性的关键点是在韧带重建时,在股骨上建立正确的隧道。
opoadoc.net
5.
Folder access control lists ( ACLs ) will not be preserved when recovering content into an active mailbox .
将内容恢复到活动邮箱中时,不会保留文件夹访问控制列表(ACL)。
www.bing.com
6.
An ACL policy is the set of rules (permissions) that specifies the conditions required to perform certain operations on that resource.
ACL策略是一组规则(权限),用于指定在资源上执行特定操作所需的条件。
www.ibm.com
7.
Gets a DirectorySecurity object that encapsulates the specified type of access control list (ACL) entries for a specified directory.
获取一个DirectorySecurity对象,它封装指定目录的指定类型的访问控制列表(ACL)项。
msdn2.microsoft.com
8.
Evaluates the performance of ACL TOP automatic coagulation analyzer and establishes an optimized coagulation analytical system.
对ACLTOP全自动血凝分析仪进行全面性能评价,建立优化适用的血凝分析系统。
www.chemyq.com
9.
This means that security groups can be set in the access control list (ACL) of a resource, such as a network share or public folder.
这意味着安全组可以在资源(如网络共享或公用文件夹)的访问控制列表(ACL)中设置。
technet.microsoft.com
10.
This length should be used before marshaling the ACL into a binary array with the GetBinaryForm method.
在使用GetBinaryForm方法将ACL封送到二进制数组中之前,应使用该长度。
msdn2.microsoft.com
1.
Call the GetAccessControl method to get a DirectorySecurity object that contains the current ACL entries of a directory.
调用GetAccessControl方法以获取包含目录的当前ACL项的DirectorySecurity对象。
msdn2.microsoft.com
2.
If the Permissions class embodies the authorization policy of an application, the ACL class implements the process of authorization.
如果Permissions类包含了应用程序的授权策略,则ACL类实现了授权处理。
www.ibm.com
3.
You can replicate ACLs as an entire list, not just individual entries, to remote copies of the database.
可以把整个ACL列表(而不是单独的项)复制到数据库的远程副本中。
www.ibm.com
4.
caller - the principal invoking this method. It must be an owner of the ACL.
调用该方法的主体,它必须是ACL的所有者。
www.51goushu.com
5.
You must first add Anonymous to the application's ACL with at least author privileges.
(至少需要通过作者权限才能先将Anonymous添加到应用程序的ACL)。
www.ibm.com
6.
Conclusions The LARS artificial ligaments can be good substitute of ACL in the ACL reconstruction surgery.
结论在关节镜下重建ACL术中,LARS人工韧带可作为自体材料的良好替代物。
www.bing.com
7.
An ACL policy controls what operations can be performed on the resource, and who can perform these operations.
ACL策略控制可以在资源上执行哪些操作以及谁能够执行这些操作。
www.ibm.com
8.
Gets a DirectorySecurity object that encapsulates the access control list (ACL) entries for a specified directory.
获取一个DirectorySecurity对象,该对象封装指定目录的访问控制列表(ACL)项。
msdn2.microsoft.com
9.
The goal of ACL reconstruction is to restore the translational and rotational stability of the knee.
交叉韧带重建的目标是恢复膝关节的平移和旋转稳定性。
opoadoc.net
10.
In the authorization and authentication areas of the client, you can add, modify, or delete users, user groups, privilege sets, and ACLs.
在该客户机的authorizationandauthenticationareas中,可以添加、修改或删除用户、用户组、权限集和ACL。
www.ibm.com
1.
As you saw in " Users, user groups, and ACLs in CM V8, " CM provides default values for most of them.
如“CMV8中的用户、用户组和ACL”一节所述,CM为大部分用户属性提供了缺省值。
www.ibm.com
2.
An ACL holds the permissions allowed to groups on a resource.
ACL拥有组对资源的权限。
www.ibm.com
3.
The IgM aCL antibodies were still positive 6 weeks later, which suggests their role as a predisposing factor of deep vein thrombosis.
磷脂抗体的抗体仍积极6周后,这表明他们的作用,成为诱发因素的深静脉血栓形成。
www.syyxw.com
4.
Database access is controlled by the Access Control List (ACL) of each database.
数据库访问是由每个数据库的访问控制列表(AccessControlList,ACL)控制的。
www.ibm.com
5.
To make ACL storage manageable, entities are grouped, and these groups are then provided permissions on different shared resources.
要增强ACL的可管理能力,必须对实体进行分组,然后为这些组提供对不同共享资源的访问权限。
www.ibm.com
6.
Access Control Lists (ACLs) determining who can access each database and to what extent.
访问控制列表(AccessControlList,ACL)确定谁能在多大范围内访问每个数据库。
www.ibm.com
7.
For a complete list of all of the get and set methods for each protected resource, see Technology Summary for ACLs.
有关每个受保护资源的所有get和set方法的完整列表,请参见ACL技术摘要。
msdn2.microsoft.com
8.
Explains the architecture of ACL classes that are used to enforce access control and audit rules.
解释用于强制访问控制和审核规则的ACL类的结构。
msdn2.microsoft.com
9.
An entry in an access control list (ACL) is an access control entry (ACE).
访问控制列表(ACL)中的项是访问控制项(ACE)。
msdn2.microsoft.com
10.
From the point of view of the individual ACLs securing the resources, this is exactly correct.
从保护资源安全的各个ACL的角度来看,这是完全正确的。
www.ibm.com
1.
Gets a FileSecurity object that encapsulates the specified type of access control list (ACL) entries for a particular file.
获取一个FileSecurity对象,它封装特定文件的指定类型的访问控制列表(ACL)项。
msdn2.microsoft.com
2.
The computational results indicate that when PCL and ACL are deficient, the displacement of femur relative to tibia is increased observably.
计算结果表明在前后交叉韧带分别缺失时,股骨相对胫骨位移较正常显著增大。
www.fabiao.net
3.
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
访问控制列表(ACL)是具有所有者和索引列表或散列的对象,如图2所示。
www.ibm.com
4.
CM uses privileges, privilege groups, privilege sets, and ACLs to authorize the users to perform specific operations on specific items.
CM使用权限、权限组、权限集合和ACL对用户进行授权,从而对特定项目执行特定操作。
www.ibm.com
5.
If public access is enabled, ICMPUBLIC takes priority on any other ACL.
如果启用了公共访问,ICMPUBLIC将拥有比任何其他ACL更高的优先权。
www.ibm.com
6.
Anterior cruciate ligament(ACL)locates in the articular genu, and is the core texture of articular genu.
前交叉韧带(ACL)位于膝关节内,是膝关节内的核心结构。
dict.kekenet.com
7.
These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes.
这些属性包括文件所有者及组权限,访问控制列表(ACL),以及扩展文件属性。
www.ibm.com
8.
By working with the world-class technology companies, ACL will be sure to manufacture world-class products within the shortest time.
通过与世界一流技术公司合作,力丰一定能在最短的时间内制造出世界一流的产品。
www.cr-expo.com
9.
The public door ACL does not exist, so you fall back on the ACL of the parent.
公共门ACL不存在,因此,您需要后退到上一级ACL。
www.ibm.com
10.
The service access control list (ACLs) settings for front-end servers are identical to the service ACLs settings for back-end servers.
前端服务器的服务访问控制列表(ACL)设置与后端服务器的服务ACL设置完全相同。
technet.microsoft.com
1.
This reduces the size of the ACL without affecting the access control semantics it grants.
这样可以缩减ACL的大小而不影响它所授予的访问控制语义。
msdn2.microsoft.com
2.
Driver with the USB core, this driver gets attached to the Belkin USB device. The HCI, ACL, and SCO data read by the.
驱动程序注册到USB核心的信息相匹配,所以这个驱动程序可附加到BelkinUSB设备。
www-128.ibm.com
3.
The ability to view an ACL is an important permission and should be granted with caution.
查看ACL的能力是一项重要的权限,应该谨慎授予该权限。
msdn2.microsoft.com
4.
Provides the ability to control access to directory objects without direct manipulation of Access Control Lists (ACLs).
提供无需直接操作访问控制列表(ACL)而控制对目录对象的访问的能力。
msdn2.microsoft.com
5.
These ACLs are also set on the directory itself, but they include Modify permissions for the CREATOR OWNER group.
这些ACL还会在该目录本身上设置,但是它们包括CREATOROWNER组的“修改”权限。
msdn2.microsoft.com
6.
These ACLs are also set on the directory itself, but they include Modify permissions for the Power Users group.
这些ACL还会在该目录上设置,但是它们包括PowerUsers组的修改权限。
msdn2.microsoft.com
7.
FileIOPermission for permission to enumerate access control list (ACL) for a directory.
FileIOPermission表示枚举目录的访问控制列表(ACL)的权限。
msdn2.microsoft.com
8.
Applies access control list (ACL) entries described by a DirectorySecurity object to the specified directory.
将DirectorySecurity对象描述的访问控制列表(ACL)项应用于指定的目录。
msdn2.microsoft.com
9.
In this case, the. NET Framework creates the needed key and related container with the ACLs of the current user.
在这种情况下,.NETFramework会创建所需的密钥及带有当前用户ACL的相关容器。
msdn2.microsoft.com
10.
Zombie users are users that appear in an Access Control List (ACL) but not in Active Directory.
僵用户是出现在访问控制列表(ACL)中但不在ActiveDirectory中的用户。
www.microsoft.com
1.
In this case, the. NET Framework creates the needed key and related container with the ACLs of the current user.
在这种情况下,.NETFramework会创建所需的密钥及带有当前用户ACL的相关容器。
msdn2.microsoft.com
2.
Zombie users are users that appear in an Access Control List (ACL) but not in Active Directory.
僵用户是出现在访问控制列表(ACL)中但不在ActiveDirectory中的用户。
www.microsoft.com
3.
The administrative users are able to execute all the data modeling operations like itemtype creation, defining ACLs, and so on.
管理用户能执行所有数据建模操作,例如项目类型创建、定义ACL,等等。
www.ibm.com
4.
To filter network traffic, ACLs determine if routed packets are forwarded or blocked at the router interfaces.
要过滤网路讯务,ACL决定可被绕送的封包在路由器介面上是否要被传送或阻隔。
dictsearch.appspot.com
5.
The ACL file stores the various principals and their level of authorization for the operations on the Kerberos database.
ACL文件存储操作Kerberos数据库所用的各个主体及其授权级别。
www.ibm.com
6.
Returns a string representation of the contents of this ACL entry.
返回该ACL入口内容的字符串形式。
www.7139.com
7.
The ligaments of the knee (MCL, ACL, and others) can be injured with trauma.
的膝关节(MCL,ACL等)的韧带受伤,外伤可以。
bjzkhj.com
8.
This module provides authorization services against file-system access-control lists (ACLs).
此模块提供针对文件系统访问控制列表(ACL)的授权服务。
msdn2.microsoft.com
9.
Most people who have ACL surgery are given a brace to wear as they return to normal and resume their sporting activities.
当他们回到常态而且重新开始他们的喜好运动活动的时候,大多数的有ACL手术的人有一个支柱穿着。
blog.sina.com.cn
10.
Removes all access control list (ACL) permissions for the specified user from the current file or directory.
从当前文件或目录移除指定用户的所有访问控制列表(ACL)权限。
msdn2.microsoft.com
1.
Removes all access control list (ACL) permissions for the specified user from the current file or directory.
从当前文件或目录移除指定用户的所有访问控制列表(ACL)权限。
msdn2.microsoft.com
2.
Writing event handlers and service methods that will interpret changes in the UI and modify ACLs and the registry accordingly.
编写将用于解释UI中的更改并相应修改ACL和注册中心的事件处理程序和服务方法。
www.ibm.com
3.
The ACL determines whether or not users have access to the database and which level of permission they are granted.
ACL确定用户是否具有访问数据库的权限,并授予用户权限级别。
www.ibm.com
4.
Yes, extended attributes and ACLs are really fun, but beware -- most backup programs currently still ignore EA and ACL data.
是的,扩展属性和ACL的确很有趣,但是,当心―大多数备份程序目前仍然忽略EA和ACL数据。
www.ibm.com
5.
If an editor is not listed in the Readers field, the user with editor ACL access cannot read or edit the document.
如果在Readers字段中没有列出该编辑,那么具有编辑ACL访问权限的用户不能阅读和编辑这个文档。
www-128.ibm.com
6.
Domino agents are controlled by database ACL rights and programmability restrictions.
Domino代理由数据库ACL权限和编程限制控制。
www.ibm.com
7.
Use the GetAccessControl method to retrieve the access control list (ACL) entries for a directory.
使用GetAccessControl方法检索某个目录的访问控制列表(ACL)项。
msdn2.microsoft.com
8.
Methods With designed surgery method, the ACL traumatic rupture was repaired with ipsilateral iliotibial tract transposition.
方法用设计术式,将同侧髂胫束转位修复外伤性ACL断裂。
www.ceps.com.tw
9.
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表(ACL)。
www.ibm.com
10.
Item type level: All the items of a particular itemtype will have same ACL.
项目类型级别:特定项目类型的所有项目具有相同的ACL。
www.ibm.com
1.
Item type level: All the items of a particular itemtype will have same ACL.
项目类型级别:特定项目类型的所有项目具有相同的ACL。
www.ibm.com
2.
It also helps you secure the connection string information using access control lists (ACLs) and encryption.
此外,还可以帮助您使用访问控制列表(ACL)和加密保护连接字符串信息。
msdn2.microsoft.com
3.
When to return to competitive or recreational sports after an ACL reconstruction is a difficult decision.
ACL重建后何时恢复到竞技或者娱乐的运动是一个困难的决定。
blog.sina.com.cn
4.
Modify access control of all actions on the ACL record type with user groups, as shown in Figure 14.
使用用户组修改ACL记录类型上的所有action的控制权限,如图14所示。
www.ibm.com
5.
The class members are concluded by defining the ACLs that provide authorization for each of the spaces you will test.
类成员以定义ACL结束,用于为您将测试的各个空间提供授权。
www.ibm.com
6.
Returns the Windows access control list (ACL) for a directory.
返回某个目录的Windows访问控制列表(ACL)。
msdn2.microsoft.com
7.
You can use ACL's in the operating system to help you secure these files.
您可以使用操作系统中的ACL(AccessControlList访问控制表)来帮助您保护这些文件。
www.bing.com
8.
Listing 4 shows the Junit test that generates and prints out an aclActorTable showing configuration information for a list of ACLs.
清单4显示了Junit测试,该测试可以生成并输出显示一组ACL的配置信息的aclActorTable。
www.ibm.com
9.
The following table lists the ACLs that should be set on application-level. Browser files in the App_Browsers subdirectory.
下表列出了应该在App_Browsers子目录中的应用程序级别的.browser文件上设置的ACL。
msdn2.microsoft.com
10.
Active Directory uses a protection mechanism to make sure that ACLs are set correctly for members of sensitive groups.
ActiveDirectory使用保护机制来确保为敏感组中的成员正确设置ACL。
support.microsoft.com
1.
Active Directory uses a protection mechanism to make sure that ACLs are set correctly for members of sensitive groups.
ActiveDirectory使用保护机制来确保为敏感组中的成员正确设置ACL。
support.microsoft.com
2.
At the organizational unit level, remove inheritance and then set the permissions to match the current ACLs on the adminSDHolder container.
在组织单位级别,删除继承然后将权限设置为与adminSDHolder容器上当前的ACL相匹配。
support.microsoft.com
3.
In right enlarged picture, the length and width of major axis, center and range of tunnel of ACL, AM and PL were indicated.
右下角为放大的止点照片,分别标记了ACL、AM和PL止点的纵轴长度、宽度、骨道中心点及范围。
www.haodf.com
4.
However, this ACL-based Web service is a small part of the much bigger SOA picture.
然而,基于ACL的Web服务是巨大的SOA体系中的一小部分。
www-128.ibm.com
5.
Configure event monitoring and enable warnings generated when database ACLs are changed.
需要配置更改数据库ACL时生成的事件监控和警告。
www.ibm.com
6.
Operating system security and access control lists (ACLs) on the server that hosts the custom server control.
承载自定义服务器控件的服务器上的操作系统安全性和访问控制列表(ACL)。
msdn2.microsoft.com
7.
The goals of physical therapy and rehabilitation after ACL surgery are to rebuild your strength and to get your motion back.
ACL手术后的物理治疗和康复的目标,是再建你的力量、恢复运动。
blog.sina.com.cn
8.
Sets the specified access control list (ACL) permission for the current file or directory.
设置当前文件或目录的指定访问控制列表(ACL)权限。
msdn2.microsoft.com
9.
For most scenarios, you can use the higher level, abstracted classes instead of the advanced classes to create and modify ACLs.
对于大多数情况,您可以使用较高级别的抽象类(而不是使用高级类)来创建和修改ACL。
msdn2.microsoft.com
10.
abstract: Objective: To analyze the value of various MRI features in the diagnosis of anterior cruciate ligament(ACL) injury.
目的:分析膝关节多种MRI征象对诊断前交叉韧带(ACL)损伤的价值。
www.bing.com
1.
abstract: Objective: To analyze the value of various MRI features in the diagnosis of anterior cruciate ligament(ACL) injury.
目的:分析膝关节多种MRI征象对诊断前交叉韧带(ACL)损伤的价值。
www.bing.com
2.
Within one hour, the ACL will be updated on the user objects associated with the protected groups to reflect the changes.
一个小时内,将对与受保护组相关的用户对象更新ACL以反映这些更改。
support.microsoft.com
3.
Specifies the principal for which permissions are granted or denied by this ACL entry.
指定该ACL入口授予或拒绝许可的主体。
www.7139.com
4.
Terraces changed from slops are the primal method to prevent the ACL and forested barren hills from soil erosion.
为防止人造耕地、绿化荒山发生水土流失,最基本的形式是“坡改梯”,做成梯田。
www.tuyelt.com
5.
Bone tunnels of the femur and the tibia were prepared with ACL anatomical isometric technique.
采用ACL解剖等长重建技术建立胫骨、股骨骨道。
www.bing.com
6.
The following example displays the ACL information that relates to the group "developers" for the teamserver2 Team Foundation Server.
下面的示例显示与teamserver2TeamFoundationServer的“developers”组有关的ACL信息。
msdn2.microsoft.com
7.
Removes all matching allow or deny access control list (ACL) permissions from the current file or directory.
从当前文件或目录移除所有匹配的允许或拒绝访问控制列表(ACL)权限。
msdn2.microsoft.com
8.
Results MRI can show clearly the ACL normal form ACL injury, tearing site and scope of the damage.
结果MRI能清楚显示ACL正常形态、ACL损伤、撕裂部位、范围等损伤情况。
211.151.93.212
9.
In some cases, you can set a registry key that tells Exchange to drop unknown users from the ACL while Exchange is in mixed mode.
某些情况下,您可以设置一个注册表项,用于在Exchange处于混合模式时通知Exchange从ACL中删除未知用户。
technet.microsoft.com
10.
The ACL knows nothing about the containment relationship between folders and files; the ACL simply lists who can do what within its scope.
ACL不了解文件夹和文件之间的包含关系;ACL仅列出谁在其范围中执行什么任务。
www.ibm.com
1.
The ACL knows nothing about the containment relationship between folders and files; the ACL simply lists who can do what within its scope.
ACL不了解文件夹和文件之间的包含关系;ACL仅列出谁在其范围中执行什么任务。
www.ibm.com
2.
Applies access control list (ACL) entries described by a FileSecurity object to the specified file.
对指定的文件应用由FileSecurity对象描述的访问控制列表(ACL)项。
msdn2.microsoft.com
3.
A DirectorySecurity object that describes an ACL entry to apply to the directory described by the path parameter.
一个DirectorySecurity对象,该对象描述要应用于path参数所描述的目录的ACL项。
msdn2.microsoft.com
4.
For this example, use the Access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
对于此示例,请使用AccessManager访问控制列表(AccessControlList,ACL)来管理ObjectGrid授权策略。
www.ibm.com
5.
The directory should be protected with highly restrictive ACLs.
该目录应利用高限制级ACL进行保护。
technet.microsoft.com
6.
The SetAccessControl method applies access control list (ACL) entries to a file that represents the noninherited ACL list.
SetAccessControl方法将访问控制列表(ACL)项应用于表示非继承ACL列表的文件。
msdn2.microsoft.com
7.
Returns the principal for which permissions are granted or denied by this ACL entry.
返回该ACL入口中许可授予或拒绝的主体。
www.7139.com
8.
For more information regarding ACL's minimum entry levels please refer to ACL's current brochure or website.
如需知悉更多有关ACL最低入学水平的资料,请参阅ACL本期的小册子或上ACL的网址查看。
zhidao.baidu.com
9.
Applications using EAz must implement ACLManager, retrieving the ACL that secures a resource from cache or persistent storage.
使用EAz的应用程序必须实现ACLManager,并从缓存或持久存储中检索保护资源的ACL。
www.ibm.com
10.
An ACL packet, which can interrupt the regular flow of SCO data.
为一ACL数据包,可中断正常的SCO数据流。
www.bing.com
1.
Instead, those resources will be set to an ACL for a local account.
而要为本地帐户的ACL设置这些资源。
msdn2.microsoft.com
2.
If rpc has write privileges, by virtue of being listed in the Figure 5 ACL, then it is the dekihost ACL owner to which he can write.
如果rpc具有写入权限(由图5中的ACL列出),则它是可以写入的dekihostACL所有者。
www.ibm.com
3.
Administrators often protect the systemroot directory using an Access Control List (ACL) to control write and execute access.
管理员通常使用访问控制列表(ACL)来保护systemroot目录,以控制写入和执行访问。
msdn2.microsoft.com
4.
Adds the specified access control list (ACL) permission to the current file or directory.
将指定的访问控制列表(ACL)权限添加到当前文件或目录。
msdn2.microsoft.com
5.
In my next article, we'll also take a look at some of XFS' advanced features, such as ACLs and extended attributes.
在下一篇文章中,我们还将研究XFS的一些高级特性,譬如ACL和扩展属性。
www.ibm.com
6.
Returns true if the given principal is an owner of the ACL.
如果给定的主体是ACL的所有者,返回true。
www.51goushu.com
7.
Immediately after an ACL injury, your knee may swell, feel unstable and become too painful to bear weight.
刚刚发生ACL损伤后,可能出现膝盖肿胀、感觉站立不稳,并且因太过疼痛而无法承担自身体重。
www.bing.com
8.
Any ACE can be inserted, modified, or removed at any location in the ACL.
可以在ACL中的任何位置插入、修改或删除任何ACE。
msdn2.microsoft.com
9.
Change the access control list (ACL) for a key container.
更改密钥容器的访问控制列表(ACL)。
technet.microsoft.com
10.
ObjectiveTo assess the value of posterior cruciate ligament (PCL) curvature in MRI diagnosis of anterior cruciate ligament (ACL) rupture.
目的探讨后交叉韧带(PCL)弓形变在MRI诊断前交叉韧带撕裂中的价值。
www.js120.net
1.
Methods Contrast the MRI appearance of 16 cases normal anterior cruciate ligament(ACL) and 19 cases injury ACL.
方法回顾性分析16例前交叉韧带正常和19例前交叉韧带损伤的MRI表现。
www.chemyq.com
2.
acledit - Allows the creation and amendments of ACL to a given file within an editor.
acledit——可以在编辑器中创建或修改给定文件的ACL。
www.ibm.com
3.
The ACL specified for the directorySecurity parameter replaces the existing ACL for the directory.
为directorySecurity参数指定的ACL替换该目录的现有ACL。
msdn2.microsoft.com
4.
An ACL defines the permissions that a newly created file or directory inherits from its parent directory .
ACL定义了一个新建的文件或目录的从它的父目录上继承下来的许可权限。
www.bing.com
5.
Objective To investigate the effect of iliotibial tract transposition for repairing of anterior cruciate ligament (ACL) traumatic rupture.
目的探讨自体髂胫束修复外伤性前交叉韧带(ACL)断裂疗效。
www.dictall.com
6.
Sets this ACL entry to be a negative one.
将该ACL入口设置为否定。
www.7139.com
7.
However, most operating systems implement a folder-related rule governing how a new file's ACL is created.
不过,大多数操作系统实现一个与文件夹相关的规则来控制创建新文件的ACL的方式。
www.ibm.com
8.
The above ACL shows the root user is not given the surrogate permission bit "G" .
以上ACL显示根用户未被赋予代理权限位“G”。
www.ibm.com
9.
Removes a single matching allow or deny access control list (ACL) permission from the current file or directory.
从当前文件或目录移除单个匹配的允许或拒绝访问控制列表(ACL)权限。
msdn2.microsoft.com
10.
Objective Research and evaluation of MRI diagnosis of ACL injury in the role and significance.
目的研究和评价MRI对ACL损伤诊断的作用及意义。
211.151.93.212
1.
If acl is not specified, then documents marked for public access will be returned.
如果未指定acl,那么将返回被标记为公共访问的文档。
www.ibm.com
2.
View the access control list (ACL) for a key container.
查看密钥容器的访问控制列表(ACL)。
technet.microsoft.com
3.
The ACL implements its grants structure as a map of PermissionCollections keyed by name.
ACL将其授权结构作为PermissionCollections的map实现,将名称作为键。
www.ibm.com
4.
When experiencing problems with ACL enabled files, re-check that your rules are correct.
当遇到与启用了ACL的文件相关的问题时,请重新检查规则是否正确。
www.ibm.com
5.
In the Perform ACL Check section, select the check box to ensure that all items in the cache are security trimmed.
在“执行ACL检查”部分中,选中该复选框,以确保安全剪裁缓存中的所有项目。
office.microsoft.com
6.
ACLs are outside the scope of this article, so everything we'll upload will be granted public, read-only access.
ACL不属于本文介绍的范围,所以我们所上传的所有文件都会授予公开的只读访问权限。
www.ibm.com
7.
NotOwnerException - if the caller principal is not an owner of the ACL.
如果调用主体不是该ACL的所有者时抛出。
www.51goushu.com
8.
Vitro screen-prints the bottles in two colors using ACL.
体外屏幕打印瓶两种颜色使用的ACL。
bzxw.512121.com
9.
Gets the access control list (ACL) entries for the current directory.
获取当前目录的访问控制列表(ACL)项。
msdn2.microsoft.com
10.
File permissions and ACLs can be monitored and fixed.
可以监控和修改文件许可权和ACL。
www.ibm.com
1.
To mitigate this threat, maintain strong ACLs on browser definition files.
为了减轻该威胁,请在浏览器定义文件上保持强ACL。
msdn2.microsoft.com
2.
A FileSecurity object that describes an ACL entry to apply to the file described by the path parameter.
一个FileSecurity对象,描述应用于由path参数描述的文件的ACL项。
msdn2.microsoft.com
3.
Define a transformation of access rights (ACLs, privilege sets).
定义访问权限(ACL,权限集)的转换。
www.ibm.com
4.
Use the GetAccessControl method to retrieve the access control list (ACL) entries for the current file.
使用GetAccessControl方法检索当前文件的访问控制列表(ACL)项。
msdn2.microsoft.com
5.
It is important to set up the ACL to databases with the proper access.
设置ACL,使之具有适当的权限访问数据库,这非常重要。
www-128.ibm.com
6.
Add an appropriately configured ACL to the file using Windows Explorer.
使用Windows资源管理器将进行相应配置的ACL添加到该文件中。
zxianf.blog.163.com
7.
After the port is added to the ACL, add it to the Windows Firewall exceptions list.
将端口添加到ACL之后,将其添加到Windows防火墙例外列表中。
msdn2.microsoft.com
8.
in this design, the ACL record name should be exactly the same as the submitter's userid.
在此设计中,ACL记录的名字应当与提交者的userid完全一样。
www.ibm.com
9.
You can do this hierarchy traversal recursively; that is, continue to look for a parent's ACL until you find one.
您可以递归地执行此层次结构遍历;即继续查找上一级ACL,直到发现ACL。
www.ibm.com
10.
Modify the ACLs on the application databases to give users author access only.
修改应用程序数据库上的ACL,只赋予用户作者权限。
www.ibm.com
1.
Next, we pass the acl into the policy document to avoid hardcoding it.
接下来,我们将在策略文档中设置acl,以避免通过硬编码实现。
www.ibm.com
2.
Select the Propagate ACLs check box to allow descendants without an explicitly defined ACL to inherit from this entry.
选择PropagateACLs复选框,允许没有明确定义ACL的后代能从这个条目中继承。
www.ibm.com
3.
However, you should expect this process to become easier as Linux distributions eventually become ACL-enabled by default.
不过,因为Linux发行版最终在缺省情况下将启用ACL,这一过程也将变得越发容易。
www-128.ibm.com
4.
Update the access control list (ACL) of the database DomForInt. nsf to prevent Anonymous access and to grant appropriate roles to the users.
更新数据库DomForInt.nsf的访问控制列表(ACL),以防止匿名访问以及向用户授权相应的角色。
www.ibm.com
5.
For more information, see ASP. NET Required Access Control Lists (ACLs).
有关更多信息,请参见ASP.NET必需的访问控制列表(ACL)。
msdn2.microsoft.com
6.
Abstracct: Objective To evaluate the value of the measurement of anterior cruciate ligament(ACL) by MRI.
前言:目的明确膝关节前交叉韧带MRI测量的意义。
www.chemyq.com
7.
The kadm5. acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于KDC主机,它控制对Kerberos数据库的访问。
www.ibm.com
8.
Returns an enumeration of the permissions in this ACL entry.
返回该ACL入口中的许可枚举。
www.7139.com
9.
You can use ADSI Edit to view and modify the ACLs for Send connectors and Receive connectors.
可以使用ADSI编辑查看和修改发送连接器和接收连接器的ACL。
technet.microsoft.com
10.
Sports Medicine Service, Beijing JST Hospital ACL ?
北京积水潭医院运动医学中心
wenku.baidu.com
1.
Fig. 1 The cadaver photograph of ACL tibial attachment of right knee, periphery of ACL and boundary of AM and PL were marked.
图1右膝关节前交叉韧带胫骨止点标本照片,ACL的边界、AM和PL的分界已标记。
www.haodf.com
2.
Returns null if there is no principal set for this entry yet.
如果该ACL入口中还没有主体设置给该入口返回null。
www.51goushu.com
3.
This is a convenience method for configuration perspectives dealing with a single ACL.
这是用于负责处理单个ACL的配置透视图的方便方法。
www.ibm.com
4.
Most file system device objects (that is, disk, CD-ROM, file, and tape) receive the "public default unrestricted" access control list (ACL).
大多数文件系统设备对象(就是,磁盘,CD-ROM,文件,和磁带)接受“公共默认非限制”访问控制列表。
dict.ebigear.com
5.
Method to retrieve the ACL entries for a file.
方法检索一个文件的ACL项。
msdn2.microsoft.com
6.
The ACL specified for the fileSecurity parameter replaces the existing ACL for the file.
为fileSecurity参数指定的ACL替换该文件的现有ACL。
msdn2.microsoft.com
7.
A SID may be displayed in the ACL editor instead of the user or group name.
在ACL编辑器中,可能显示SID而不是用户或组名。
support.microsoft.com
8.
If multiple values are specified, the specified acl will be OR'ed for maximum results.
如果指定了多个值,指定的acl将进行“OR”运算以得到最大的结果。
www.ibm.com
9.
Knee injuries, especially to the anterior cruciate ligament (ACL), are some of the most common and serious, the new study found.
新的研究发现,膝盖受伤,特别是前十字韧带(ACL)受伤,是最普遍和最严重的。
www.bing.com
10.
GSD supports access control lists (ACL) based sharing.
GSD支持基于共享的访问控制列表(ACL)。
www.infoq.com
1.
Adds the specified permission to this ACL entry.
给该ACL入口添加指定许可。
www.7139.com
2.
You must consider the maximum number of ACL entries a file system can hold for each Web service.
对于每个Web服务,你必须考虑文件系统所能够容纳的ACL条目的最大数量。
www-128.ibm.com
3.
The ability to change or view an ACL is an important permission and should be granted with caution.
更改或查看ACL的能力是一项重要的权限,并且应该谨慎授予该权限。
msdn2.microsoft.com
4.
The ACLs are defined on the connector object in Active Directory or ADAM.
ACL是针对ActiveDirectory或ADAM中的连接器对象定义的。
technet.microsoft.com
5.
Now, the ACL is defined to give the root user read, write, and execute permissions, but not the deletion (that is, the "d" ) permission bit.
现在,ACL已定义成赋予根用户读、写和执行权限,但没有删除权限位(即“d”)。
www.ibm.com
6.
Not all users in the ACLs are also firewall users or administrators.
并不是ACL中的所有用户都是防火墙用户或管理员。
www.ibm.com
7.
Sometimes you need to programmatically change the ACLs of an existing file or folder.
有时候,您需要以编程方式更改现有文件或文件夹的ACL。
msdn2.microsoft.com
8.
The operation of the core ACL class in permitting actions based on PermissionSets associated with groups and principals.
核心ACL类在基于与组和主体相关联的PermissionSets的许可操作中的运行。
www.ibm.com
9.
Access control lists (ACLs) can have a mixture of users from different authentication providers.
访问控制列表(ACL)可以包含来自不同验证提供程序的用户。
office.microsoft.com
10.
A directory to add or remove access control list (ACL) entries from.
要从中添加或移除访问控制列表(ACL)项的目录。
msdn2.microsoft.com
1.
The return to play (RTP) percentage and the factors affecting RTP after ACL reconstruction in NFL players are not well defined.
重返赛场(RTP)率和影响重返赛场的因素尚不清楚。
www.oaopdoc.com
2.
The access control list (ACL) structure is invalid.
访问控制列表(ACL)结构无效。
www.dictall.com
3.
For example, you could add a theatre available to all Campus A users and create no ACL for it.
例如,您可以添加用于校园A的所有用户的剧场,并且不为它创建任何ACL。
www.ibm.com
4.
Object that describes an ACL entry to apply to the current file.
对象,该对象描述要应用于当前文件的ACL项。
msdn2.microsoft.com
5.
The following are the configuration details for using NFSv4 ACL with Samba.
下面介绍在Samba中使用NFSv4ACL的配置细节。
www.ibm.com
6.
Women are especially prone to knee problems, and they injure the anterior cruciate ligament (ACL) twice as often as men.
女性特别倾向于发生膝关节受伤,前十字韧带(ACL)受伤频率是男性的2倍。
news.dxy.cn
7.
Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs).
GoogleStorage是值得花大精力的,这主要是因为它支持通过访问控制列表(ACL)实现的强大访问控制。
www.ibm.com
8.
There are two possible errors; the error depends on the ACL level of the mail owner.
可能有两种错误;错误取决于邮件所有者的ACL权限级别。
www.ibm.com
9.
Everyone was worried about my torn ACL in college when my knee was fine.
所有人都担心我的韧带撕裂,但我的膝盖已经完全好了。
bbs.ahradio.com.cn
10.
The main responsibility of a firewall is to block access in more complex manner than that provided by ACLs.
防火墙的主要职责是提供一种比ACL更为复杂的访问阻塞方式。
dict.ebigear.com
1.
Configuring an ACL is a directory specific task.
配置ACL是一个特定于目录的任务。
www.ibm.com
2.
The universal security group then replaces the UDG in the ACL.
然后,该通用安全组将取代ACL中的UDG。
technet.microsoft.com
3.
This scenario describes how to modify the ACLs for an existing file or folder using the managed ACL classes.
该方案描述如何使用托管ACL类修改现有文件或文件夹的ACL。
msdn2.microsoft.com
4.
Public access is a way to enable CM to bypass ACL checking for each user or user group.
公共访问是一种使CM能绕过ACL检查的方法。
www.ibm.com
5.
ACLs authorize or deny actions for the ACLHolders they protect.
ACL授权或拒绝对它们所保护的ACLHolder的操作。
www.ibm.com
6.
Let's illustrate ACL scope using the virtual campus application example.
下面我们还用虚拟校园应用程序示例说明ACL范围。
www.ibm.com
7.
What ACL permissions does a process using it require?
使用这个类的进程需要什么ACL权限?
www.bing.com
8.
The owner of a file can set their own ACL.
文件的所有者可以设置自己的ACL。
www.ibm.com
9.
This scenario describes how to specify the ACLs for a new file or folder using the managed ACL classes.
该方案描述如何使用托管ACL类为新文件或文件夹指定ACL。
msdn2.microsoft.com
10.
A file to add or remove access control list (ACL) entries from.
在其中添加或移除访问控制列表(ACL)项的文件。
msdn2.microsoft.com
1.
This shows that only members in the "SuperAdmin" group can operate on the ACL record type.
这显示了只有在“SuperAdmin”组中的成员可以对ACL记录类型操作。
www.ibm.com
2.
For directory object ACLs, the nonobject ACEs come before object ACEs.
对于目录对象的ACL,非对象ACE优先于对象ACE。
msdn2.microsoft.com
3.
These agents create test user Person documents, set ACL values, and more.
这些代理创建测试用户Person文档、设置ACL值等等。
www.ibm.com
4.
Add a new stateless record type called ACL (this step of the process is illustrated in Figures 6-11 following).
增加一个新的状态无关记录类型,名为ACL(此过程的步骤如下面的图6-11所示)。
www.ibm.com
5.
Removes the specified permission from this ACL entry.
从该ACL入口中删除指定的许可。
www.7139.com
6.
The ACL should be persisted and retrieved using ordinary database types, such as varchar or string.
应使用普通数据库类型(如varchar或字符串)保留和检索ACL。
www.ibm.com
7.
Listing 4 is a sample configuration file defining ACLs.
清单4是定义了ACL的一个示例配置文件。
www.ibm.com
8.
ACLs have certain default actions (or permissions) associated with them, but, if necessary, we can create a custom action group.
ACL具有与其关联的特定缺省操作(或权限),但如有必要,可以创建自定义操作组。
www.ibm.com
9.
But ACLs are only half the story of authorization.
但是,ACL只是授权过程的一部分。
www.ibm.com
10.
You must add the Anonymous role to the ACL and give it Author privileges.
您必须将Anonymous角色添加到ACL中,并为其授予Author权限。
www.ibm.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/1/13 9:59:28