单词 | Access control. | ||
释义 | Access control.
例句释义: 入口控制,存取控制,访问控制服务 1. The name of the system mutex whose access control security rules are to be retrieved. 要检索其访问控制安全性规则的系统mutex的名称。 msdn2.microsoft.com 2. The best way to explain access control is to use examples with real things rather than trying to relate to concepts. 试着解释访问控制概念的最好方法就是举个实例,这比纯粹进行概念阐述要好得多。 blog.csdn.net 3. Label-based access control provides you with a method to have complete control on who can access the data in a very granular way. 基于标签的访问控制实现了对数据访问的细粒度控制。 www.ibm.com 4. Finally, check point and access control was used for fault tolerance and security of the system. 最后使用检查点和访问控制实现系统的容错和安全。 www.lw23.com 5. Because these objects are used in public folder access control lists (ACLs), it is crucial that this information be replicated correctly. 由于这些对象是在公用文件夹访问控制列表(ACL)中使用的,因此,正确复制此信息是至关重要的。 technet.microsoft.com 6. For more information about this conversion and its implications, see Public Folder Access Control in Mixed Mode. 有关此转换过程及其所涉及的问题的详细信息,请参阅混合模式下的公用文件夹访问控制。 technet.microsoft.com 7. Access Control List (ACL): An ACL is a data structure that associates to a set of principals a list of permissions for a service. 访问控制列表(ACL):ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。 www.ibm.com 8. An attempt to add a resource account to an Access Control List (ACL) failed because resource accounts do not have associated user accounts. 试图将资源帐户添加到访问控制列表(ACL)失败,因为资源帐户没有相关联的用户帐户。 www.microsoft.com 9. Searches for a matching access control rule with which the new rule can be merged. 搜索可以将新规则与之合并的匹配访问控制规则。 msdn2.microsoft.com 10. Robust access control mechanism that isolates the system hardware and software totally form the user is enough to counter this attack. 用健壮的访问控制机制使用户与系统软、硬件完全隔离,就足够抵抗这类攻击。 bbs.pediy.com 1. The first bit of access control actually happens at login when a PAM module decides that Bob must log in to role cashier_r. 当PAM模块决定Bob必须登录到cashier_r角色中时,将实际发生访问控制的第一部分。 www.ibm.com 2. As you know, you can also provide access-control lists. 我们知道,您还可以提供访问控制列表。 www.ibm.com 3. Is an employee identification system used for positive identification and access control? 是否实施了员工身份认证系统和出入控制? wenku.baidu.com 4. To optimize the management of access control, an IT organization might have a policy enforcement point or set of enforcement points. 为了优化对访问控制的管理,IT组织可能需要一个或一组策略实施点。 www.ibm.com 5. Each S3 object has an access-control list (ACL) associated with it that explicitly identifies the grants and permissions for that resource. 每个S3对象有一个相关联的访问控制列表(ACL),ACL显式地指定此资源的授权。 www.ibm.com 6. If there is no group with this name, it is created and given the multipurpose type, meaning it may be used for email or access control. 如果没有这个给定名称的组,就需要创建该组并为它提供通用类型,这意味着它可以用于电子邮件或访问控制。 www.ibm.com 7. But that access control knowledge is all confined to the Earth System Grid portal. 但是这种访问控制知识完全被限制在EarthSystemGrid门户中。 www-128.ibm.com 8. File security access control is the core of the bank automatic teller machine security. 文件安全访问控制,是银行自动柜员机安全的核心部分。 www.joca.cn 9. Role-based access control is one of the effective means to protect resources in a security system. 基于角色的访问控制是安全系统中保护资源的有效手段之一。 www.ceps.com.tw 10. Specifies a user account , group account, or logon session to which an access control entry applies . 指定访问控制项应用于的用户帐户、组帐户或登录会话。 www.bing.com 1. Pulling together information from a variety of sources also carries with it security concerns, including access control. 将多种来源的信息整合在一起将会带来包括访问控制在内的安全性问题。 www.ibm.com 2. A mutex provides exclusive access control for a resource between threads, as shown in. 所示,互斥提供线程间资源的独占访问控制。 www-128.ibm.com 3. Each of these application roles aggregates a set of very specific portal access control roles. 其中的每个应用程序角色都聚合一组非常特定的门户访问控制角色。 www.ibm.com 4. If ignore access control in caches is set to false for a portal page, a completely rendered page will not be cacheable at all. 如果将某个门户页面的忽略缓存中的访问控制设置为False,将不能对完全呈现的页面进行缓存。 www.ibm.com 5. Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs. 在有这个命令之前,您需要使用Role-BasedAccessControl(RBAC)来帮助纠正setuid和setgid程序的问题。 www.ibm.com 6. The text has came up with an new thinking: active defense technology is drew into the access control of the information systems. 本文提出一种全新的思路,把主动防御技术引入到信息系统的权限控制中。 www.ourtra.com 7. NOTE: This modification does not change or override any access control that may be in place for Lotus Notes-based components on the page. 注意:该修改不改变或覆盖页面上用于基于LotusNote的组件的任何访问控制。 www.ibm.com 8. This case will illustrate how different access control lists interact with a given set of queues. 这个用例将展示不同访问控制列表与特定队列集之间的交互。 www.ibm.com 9. This overload allows you to specify the access control action as will as the registry permission access. 这个多载可让您指定存取控制动作以及登录使用权限存取。 msdn.microsoft.com 10. Increasingly seen as a necessary part of the comprehensive de- sign package, access control has prompted the growth of security technology. 门禁控制作为综合设计包必不可少的一部分,已带动了安全技术的发展,这是愈加显而易见的。 www.znjzdq.cn 1. As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data. 随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。 www.ibm.com 2. The inclusion of both field-level and instance-level access control lists satisfies the requirement for a thorough access-control mechanism. 包含有字段级和实例级访问控制列表满足了完全的访问控制机制的需求。 www-128.ibm.com 3. Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this ObjectSecurity object is protected. 获取一个布尔值,该值指定与此ObjectSecurity对象关联的系统访问控制列表(SACL)是否受到保护。 msdn2.microsoft.com 4. when working with access control entries , you specify a trustee to which you are assigning the rights. 在使用访问控制项时,您指定向其分配权限的受信者。 www.ichacha.net 5. Additional access control is required for fine-grained protection of the assets associated with that service. 对与该服务相关联的资产的细粒度保护还需要其它访问控制。 www.ibm.com 6. Class with the specified sections of the access control security rules from the system semaphore with the specified name . 使用来自具有指定名称的系统信号量的访问控制安全性规则的指定部分来初始化。 www.bing.com 7. EXtensible Access Control Markup Language (XACML) is an open standard for defining authorization to a resource. 可扩展访问控制标记语言(EXtensibleAccessControlMarkupLanguage,XACML)是用于为资源定义授权的开放标准。 www.ibm.com 8. This allows you to establish fine-grained access control for file system objects and support inheritance features. 这样使得您可以为文件系统对象建立细粒度的访问控制,并且支持继承特性。 www.ibm.com 9. XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages. XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。 www.ibm.com 10. It may be necessary to secure event payloads from unauthorized access using access control. 可能需要使用访问控制来保护事件负载免受未经授权的访问。 www.ibm.com 1. Sets the inheritance protection for the System Access Control List (SACL) associated with this CommonSecurityDescriptor object. 为与此CommonSecurityDescriptor对象关联的系统访问控制列表(SACL)设置继承保护。 msdn2.microsoft.com 2. For user management, rule-based access control model was used to define roles and responsibilities in sheet metal parts manufacturing. 对于人员管理,定义了飞机钣金零件制造的人员角色及其主要职责,采用基于规则的权限控制方法; www.ceps.com.tw 3. The computer access control technology as a very important part of information assurance area has been researched widely and thoroughly. 计算机访问控制是信息安全领域中的一项重要技术,正在展开深入、广泛的研究与应用。 www.fabiao.net 4. Ensure safety system, fire fighting system, access control system, monitoring system to be in the normal status. 负责公司安全系统、消防设施、门禁系统及监控系统的正常运行; www.gao8dou.com 5. Other costs include the office construction, the installation of security systems and access control systems, and design fees. 其他费用包括办公场地的建造、保安系统及出入控制系统的安装和设计费用。 yeebang.com 6. Class with the specified sections of the access control security rules from the system mutex with the specified name. 使用来自具有指定名称的系统mutex的访问控制安全性规则的指定部分初始化。 msdn2.microsoft.com 7. Provides exclusive access control for a resource between threads within the current process. 为当前进程中的线程提供资料的独占访问控制。 www-128.ibm.com 8. It offers a flexible, user-friendly solution for a wide range of access-control applications, including car parks. 它为访问控制系统应用(包括停车场)提供了一种灵活、人性化的解决方案。 www.bing.com 9. Represents an abstraction of an access control entry (ACE) that defines an access rule for a file or directory. 表示定义文件或目录的访问规则的访问控制项(ACE)的抽象。 msdn2.microsoft.com 10. The access control entries that follow the removed item move up to occupy the vacated spot. 跟在所移除项之后的各访问控制项上移以占据空出的点。 msdn2.microsoft.com 1. The repository can categorize and provide access control for any of your submitted assets. 储存库可以分类并对提交资源提供了访问控制。 www.ibm.com 2. These support interactions with the Access Control model and with the Classification Systems. 这些界面支持与访问控制模型和分类系统进行交互。 www.ibm.com 3. Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information. 自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。 www.ibm.com 4. We'd heard that the access control of Drupal can be more granular, but figured we could deal with that using the flexible extensibility. 有人认为Drupal的访问控制粒度应该更细,但是我们认为可以利用灵活的可扩展性应对这方面的问题。 www.ibm.com 5. In the design of large-scale information system, access control system part is always a complicate task. 在大型信息系统的设计中,访问控制一直是一项复杂的工作。 www.ceps.com.tw 6. Access control can be externalized to a network proxy instead of being performed within the local app. 访问控制可以外化给网络代理,不用再在本地应用里执行。 www.infoq.com 7. The underlying access control entries change as you apply and remove rules. 在应用和移除规则时,基础访问控制项会发生更改。 msdn2.microsoft.com 8. Adding or removing access control entries in ways that do not maintain the canonical ordering. 以不保持规范排序的方式添加或移除访问控制项。 msdn2.microsoft.com 9. Consider the issues surrounding access control: You are authenticating the actor to operate within the program in a given role. 设想关于访问控制的问题:假设您正在鉴定一个以给定角色在程序中进行操作的参与者。 www-128.ibm.com 10. Which command is used to display the placement and direction of an IP access control list on a router? 哪一条命令可以显示路由器的IP访问列表? bbs.kaibi.com.cn 1. However, you can apply Portal access control and limit the usage of these shared resources to certain virtual portals. 不过,您可以应用门户访问控制来限制某些虚拟门户使用这些共享资源。 www.ibm.com 2. This filtering of resources cannot be modified; you cannot override this behavior using access control. 这一资源的过滤不能变更;您不能使用存取控制废弃这一性能。 www-128.ibm.com 3. Windows access control security can only be applied to registry keys. Windows访问控制安全性只能应用于注册表项。 msdn2.microsoft.com 4. Analyzing the main access control mechanism currently, performing authorization with PMI-based attribute certificate. 分析了目前主要的访问控制机制,使用基于PMI的属性证书实施授权。 www.lw23.com 5. As you can see, the mechanism provided here can implement a very fine-grained type of access control. 正如您看到的那样,这里所提供的机理可以实施一种非常精细的访问控制。 www.ibm.com 6. The system used the data dictionary on user access control, data meaning translating, and page dynamic customization. 系统通过数据字典技术进行用户访问控制、数据语义规格化和显示页面动态定制等工作。 www.ceps.com.tw 7. Application contexts thus permit flexible, parameter-based access control using attributes of interest to an application. 通过应用程序上下文,开发者可以根据应用程序的属性信息实现灵活的,基于参数的访问控制。 www.zw1840.com 8. This includes identification and authentication, authorization, access control, data masking, auditing, and encryption. 这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。 www.ibm.com 9. An online policy is used for encrypting data written to a file system and protecting data with access control. 在线策略,用于加密写到文件系统的数据,以及通过访问控制保护数据。 www.ibm.com 10. UCON model has become a hot research as the next generation of access control technology. 作为下一代访问控制技术的使用控制(UCON)模型已经成为访问控制技术研究的热点。 kns50.chkd.cnki.net 1. The absolute path of the file or directory in which access control information can be changed. 可在其中更改访问控制信息的文件或目录的绝对路径。 msdn2.microsoft.com 2. Shibboleth is an Open Source project that provides federated identity and access control between academic institutions. Shibboleth是一个开放源代码项目,在学员之间提供联邦制的身份确认和访问控制。 www.ibm.com 3. Telecommunication security - Service access control and synchronization for audiovisual services. 电信的安全性。视听服务用控制和同步服务通道。 www.std168.com 4. Access control may also need to be customized to the needs of a large enterprise customer. 需要对于大企业客户的需求定制访问控制。 www.ibm.com 5. Therefore, it is of great practical significance to establish a highly-efficient UI model which supports access control. 因此,建立一个高效的支持访问控制的用户界面模型具有很强的实际意义。 www.fabiao.net 6. And the access control on network resources is an important part of it. 而对网络资源的访问控制则是其中的一个重要方面。 www.fabiao.net 7. Applies the specified modification to the System Access Control List (SACL) associated with this ObjectSecurity object. 将指定修改应用于与此ObjectSecurity对象关联的系统访问控制列表(SACL)。 msdn2.microsoft.com 8. The media access control protocol can be very simple. 介质访问控制协议可以非常简单。 wenku.baidu.com 9. Once the access control is granted, the IP address can be allocated and the routing (or bridging, even) enabled for the particular device. 一旦被授予的访谒节制,IP地址可以分配和路由(或桥接,偶数)为特定的设备启用。 www.cctvg.cn 10. However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection. 不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。 www.ibm.com 1. The memory array contains a number of memory blocks configured to have independent access control. 存储器阵列具有多个存储器区域,各存储器区域是独立进行存取控制的。 ip.com 2. Adds the specified audit rule to the System Access Control List (SACL) associated with this DirectoryObjectSecurity object. 将指定的审核规则添加到与该DirectoryObjectSecurity对象关联的系统访问控制列表(SACL)。 msdn2.microsoft.com 3. The these use role based access control model, design a set of logical data model and propose the basic algorithm for access database. 文中在数据访问控制方面采用了基于角色的安全策略,设计了数据访问控制的逻辑模型和基本方法。 www.magsci.org 4. Maintain the normal operation of the system, access control and basic data management, etc. 维护系统正常运作,权限管理,基础数据管理等。 www.waiwenfanyi.com 5. New access-control methods will also be introduced as research into operating system security continues. 随着对操作系统安全性的深入研究,将会引入新的访问控制方法。 www.ibm.com 6. One of the AccessControlSections values that specifies the type of access control list (ACL) information to receive. AccessControlSections值之一,它指定要接收的访问控制列表(ACL)信息的类型。 msdn2.microsoft.com 7. One of the PropagationFlags values that specifies how Access Control Entries (ACEs) are propagated to child objects. PropagationFlags值之一,该值指定访问控制项(ACE)如何传播到子对象。 msdn2.microsoft.com 8. A MutexSecurity object that represents the access control security to be applied to the named system mutex. 一个MutexSecurity对象,表示应用于已命名的系统互斥体的访问控制安全性。 msdn2.microsoft.com 9. Digital HD video surveillance, burglar alarm, access control attendance, the public address system design and construction. 数字硬盘录像监控、防盗报警、门禁考勤、公共广播系统设计施工。 www.tonke.cn 10. The fundamental reason is that this ties the store in with the WebSphere Commerce access control model. 根本原因是,这可以与WebSphereCommerce访问控制模型中的商店联系起来。 www.ibm.com 1. The server can impersonate the client for access control list (ACL) checking , but it cannot access system objects as the client . 服务器可以模拟客户端进行访问控制列表(ACL)检查,但不能作为客户端访问系统对象。 www.bing.com 2. This configuration uses the local filesystem for storing the repository data and a SimpleAccessManager for access control. 这个配置使用本地文件系统来保存仓库数据,用SimpleAccessManager进行访问控制。 www.ibm.com 3. In one sense, Acegi is an attempt to apply OS-like access control lists to the Java EE environment. 在某种意义上说,Acegi是将像操作系统一样的访问控制列表应用到JavaEE环境的一种尝试。 www.ibm.com 4. How can we create a set of tabs and pages to provide the navigation, or access control, which different groups of users require? 我们如何创建一组标签和页面,以提供不同组的用户需要的导航或者访问控制? www.ibm.com 5. Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems. 尽管这个文件由ACL(AccessControlList)保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。 www.ibm.com 6. The case shows that attribute expression and AXACML can describe and enforce the complex access control policy in a simple and flexible way. 该实例表明属性表达式和A-XACML能够灵活简单地描述和实施复杂的访问控制策略。 www.ceps.com.tw 7. Class with the specified identity reference, access control type, child object type, and Active Directory security inheritance information. 使用指定的标识引用、访问控制类型、子对象类型和ActiveDirectory安全继承信息来初始化。 msdn2.microsoft.com 8. This is the interface used for representing one entry in an Access Control List (ACL). 该接口用来表示访问控制列表中(ACL)的一个入口。 www.51goushu.com 9. Specify the administrative DN, which not subject to access control or restrictions for operations on this database. 指定管理DN,它不用于访问控制或限制数据库的操作。 www.ibm.com 10. The system also allows more integration with third-party access control and physical security systems. 该系统还允许有第三方的访问控制和物理安全系统的更多的整合。 www.21csp.com.cn 1. Access-control systems need stronger tamper protections and a way to encrypt transmissions, Franken said. 出入控制系统需要强有力的干预和保护方式加密传输,弗兰肯说。 www.sjgcz.cn 2. Community-produced software requires methods for distribution, collaborating and conflict avoidance, and access control. 社区生成的软件需要分发、协作、避免冲突和访问控制的方法。 www.ibm.com 3. This type of control is called mandatory access control (MAC). 这种控制类型称为强制访问控制(MAC)。 www.ibm.com 4. Currently the security of the files in computers is mainly protected by the access control mechanisms of the operating system. 目前计算机文件数据的安全主要通过操作系统的访问控制机制来进行保护。 www.lw23.com 5. In some specific system, highly sensitive resources can only be open to certain users, so there must set access control mechanism. 在某些特定系统中一些高敏感资源只能对某些用户开放,这就需要设立访问控制权限机制。 www.fabiao.net 6. On this foundation, the paper designs the discretionary access control overall framework and the security check Algorithm. 在此基础上,设计了自主访问控制整体框架和安全检查策略。 www.fabiao.net 7. Modifies the user access control list (ACL) and displays authorization settings for an item under version control . 修改用户访问控制列表(ACL)并显示受版本控制的项的授权设置。 www.bing.com 8. Access control is used to restrict user access to Message Queuing objects, and is implemented by assigning security descriptors to objects. 访问控制用于限制用户对“消息队列”对象的访问,并通过为对象指派安全描述符来实现。 msdn2.microsoft.com 9. With this access control based on the identity associated with a message, security is independent of both transport type and message format. 利用这种基于与消息相关的身份的访问控制,就可使安全性独立于传输类型和消息格式。 www.ibm.com 10. Class with the specified identity reference, access control type, Active Directory security inheritance, and inherited object type. 使用指定的标识引用、访问控制类型、ActiveDirectory安全继承和继承对象类型来初始化。 msdn2.microsoft.com 1. In this paper, many research works have been done on the traditional access control technologies in workflow- management system. 本论文对工作流系统访问控制技术进行了较深入的研究。 www.fabiao.net 2. Passwords, session timeouts , and access control all create obstacles for a legitimate user. 密码、会话超时以及访问控制这些都给合法用户造成了障碍。 dictsearch.appspot.com 3. As an important mechanism in security services, access control can protect system resources from invalid usage. 访问控制是安全服务中一种重要的机制,它能够保护系统资源免遭非法使用。 www.fabiao.net 4. Folder access control lists ( ACLs ) will not be preserved when recovering content into an active mailbox . 将内容恢复到活动邮箱中时,不会保留文件夹访问控制列表(ACL)。 www.bing.com 5. A framework of Role-Based Access Control and its implementation mechanism and principle are introduced in detail in this paper. 介绍一种基于角色的访问控制框架,详细阐述了该框架的实现原理和工作机制。 www.ceps.com.tw 6. Class with the specified identity reference, access control type, and Active Directory security inheritance information. 使用指定的标识引用、访问控制类型和ActiveDirectory安全继承信息来初始化。 msdn2.microsoft.com 7. Role Based Access Control (RBAC) has been proposed as an alternative approach to the traditional access control mechanism. 基于角色的访问控制(RBAC)被推荐来代替传统的访问控制模型。 www.ceps.com.tw 8. Class with the specified identity reference, access control type, property access, and Active Directory security inheritance. 使用指定的标识引用、访问控制类型、属性访问和ActiveDirectory安全继承来初始化。 msdn2.microsoft.com 9. Traditional database system access control mechanism is relatively simple, which is far from satisfying the collaborative system. 传统数据库系统中的访问控制机制比较简单,远不能满足协同系统的要求。 kns50.chkd.cnki.net 10. Mutability is a new concept, although its features can be found in traditional access control models and policies. 在传统的访问控制模型和策略中虽有可变的特性,但属性的可变性是一个全新的概念。 dictsearch.appspot.com 1. REG-Sentry is one of the first automated vehicle access-control systems based on automatic license plate recognition. 登记哨兵是最早的基于自动车牌识别的自动车辆出入管理系统之一。 www.bing.com 2. The sensor can be used in entrance control, access control, and tailgate detection applications. 感应器可用在出入口控制处,访问控制和问随监测。 www.21csp.com.cn 3. It will be served with a Workflow-Engine and a role-based access-control. 它将可以作为一个工作流引擎,以及一个基于角色的访问控制器。 osl.bsw.net.cn 4. Enterprise encyclopedias are databases that have role-based access control and instance-level access control. 企业百科全书是拥有基于角色控制以及实例层次控制的数据库。 www.ibm.com 5. Provides access control based on client hostname , IP address , or other characteristics of the client request . 提供基于客户端主机名、IP地址或者客户端请求的其他特性的存取访问控制。 www.bing.com 6. Gets a DirectorySecurity object that encapsulates the specified type of access control list (ACL) entries for a specified directory. 获取一个DirectorySecurity对象,它封装指定目录的指定类型的访问控制列表(ACL)项。 msdn2.microsoft.com 7. This means that security groups can be set in the access control list (ACL) of a resource, such as a network share or public folder. 这意味着安全组可以在资源(如网络共享或公用文件夹)的访问控制列表(ACL)中设置。 technet.microsoft.com 8. Draw TRBAC who haves time constraint control pattern , and uniting the practice put up the system access control based on characters . 引入含有时间约束的TRBAC控制模型,结合实践构筑了系统的基于角色的访问控制。 www.fabiao.net 9. Multicast security contains access control, authentication, confidence of multicast data transmission and etc. 多播的安全需求主要有接入控制、认证、多播数据传输的保密性等。 dictsearch.appspot.com 10. Most of the current systems implement access control and authorization in a proprietary manner. 目前多数系统都以专有的方式实现访问控制和授权。 www.ibm.com 1. Fine-grained access control goes beyond granting or denying the right to execute a program or read a data file. 细粒度访问控制不只是授予或拒绝执行程序或读取数据文件的权限。 www.ibm.com 2. An administrator can assign users to different roles as defined in the access control section of the Drupal administrative interface. 管理员可以在Drupal管理界面的访问控制部分中为用户分配不同的角色。 www.ibm.com 3. Gets flags that specify the inheritance propagation properties of this Access Control Entry (ACE). 获取指定此访问控制项(ACE)的继承传播属性的标志。 msdn.microsoft.com 4. The dissertation is dedicated to techniques of Role-and-Task Based Access Control and its application in E-governance. 本论文研究角色与任务相结合的访问控制技术及其在电子政务系统中的应用。 www.fabiao.net 5. How to do for these management information system building a strong rights management access control system. 如何为这些管理信息系统构建一个强健的权限管理访问控制系统。 ks.cn.yahoo.com 6. It also allows formation of IBM groups both for communication purposes and for access control to private areas of land. IBM还在SecondLife中组成了专门的小组,处理交流和私有区域的访问控制。 www.ibm.com 7. They both share a lot of concepts and a domain -- the domain of authentication, authorization, and access control. 它们有很多相同的概念,要处理的问题域也在很大程度上重叠:验证、授权和访问控制。 www.ibm.com 8. Description : A placeholder in an inheritable access control entry (ACE) . 说明:可继承访问控制项(ACE)中的占位符。 www.bing.com 9. Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system. 与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。 www.dictall.com 10. The Marine Corps has recognized Defense ID as a solution for anti-terrorism, force protection, and access control. 海军陆战队已经将防御ID系统作为反恐怖、保护军队和访问控制的解决方案。 www.etiri.com.cn 1. Access control. Enables the system to recognize security policies for groups of users. 访问控制—使系统能够识别用户组的安全性策略。 www.ibm.com 2. Access Control System is a new access management: Allow people with the authority to enter designated areas, but no authority to the staff. 门禁系统是一种全新的出入管理方式:允许具有权限的人进入指定的区域,同时拒绝没有权限的人员。 www.chinarefrigerator.cn 3. Besides, the article also presented solutions of access control, reader management, data lasting and custom-made service development etc. 除此以外,文章还给出了访问控制、读写器管理、数据持久化与定制服务开发等的解决方案。 www.fabiao.net 4. However, HIS System is facing new challenges in Access Control as the Privacy disclosure of Medical Information. 但与此同时,带来了医疗信息隐私泄露问题,给HIS系统的访问控制带来新的挑战。 www.boshuo.net 5. Access Control Designer - Access Control Designer is a universal modular tool for visually designing access control policies. 访问控制设计器是为虚拟设计访问控制策略提供的一个通用模块。 cosoft.org.cn 6. There are several alternative methods, defined below, you can choose from to facilitate the validation of your domain access control. 有几种可供选择的方法,定义如下,你可以选择,以方便您的域的访问控制验证。 bbs.idcspy.com 7. In open information system, access control is an important measure that assures the information system security. 在开放式信息系统中,访问控制是保证信息系统安全的一项重要措施。 www.ceps.com.tw 8. The lack of good access control makes threading more difficult than necessary. 如果缺少良好的访问控制,会使线程编程非常困难。 www-128.ibm.com 9. MAC Framework: FreeBSD supports Mandatory Access Control, a feature usually found in trusted operating systems available for high prices. FreeBSD支持强制访问控制,一般在昂贵的可信的操作系统才能见到的特性。 blog.163.com 10. Defining access-control policies is beyond this article's scope; see Resources for a link to an article on that topic. 定义访问控制政策不在本文的讨论范围;在参考资料部分获取该主题的另一文章链接。 www.ibm.com 1. The individual options, while achieving the same privilege setup , can have varying impact on overall access control performance . 虽然各个选项实现相同的特权设置,但是可以对整体访问控制性能产生不同的影响。 www.bing.com 2. OmniFind can be configured to associate documents with security tokens or access control lists. OmniFind可以配置来将文档与安全令牌或访问控制列表相关联。 www.ibm.com 3. Gets or sets the System Access Control List (SACL) for this CommonSecurityDescriptor object. 获取或设置此CommonSecurityDescriptor对象的系统访问控制列表(SACL)。 msdn2.microsoft.com 4. For some organizations, access control to projects may not be a significant issue. 对于一些组织,对项目访问控制也许不是一个重要问题。 www.ibm.com 5. Gets a DirectorySecurity object that encapsulates the access control list (ACL) entries for a specified directory. 获取一个DirectorySecurity对象,该对象封装指定目录的访问控制列表(ACL)项。 msdn2.microsoft.com 6. And an implementation of role-based access control is given to solve the problem of the access control in examination system. 并就考试系统的访问控制问题,给出了基于角色访问控制模型的权限设计实现。 www.dictall.com 7. Define portlet interaction and access control according to the business logic to be implemented. 根据要实现的业务逻辑定义Portlet交互和访问控制。 www.ibm.com 8. Then the thesis gives an instance of an improved and general purpose access control model in the foreign trade field. 最后还给出了一个改进的、在外贸业务领域相对通用的访问控制模型的具体实现。 www.fabiao.net 9. Class with the specified identity reference, access control type, and Active Directory security inheritance. 使用指定的标识引用、访问控制类型和ActiveDirectory安全继承来初始化。 msdn2.microsoft.com 10. This new approach will help eliminate redundant access control lists and allows companies to quickly react to changing business conditions. 这一方法有助于减少冗余的存取控制列表,从而使得企业可以根据事务环境的变化迅速作出调整。 bbs.translators.com.cn 1. For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi. 但是,目前我将继续向您展示如何使用Acegi配置一个简单的访问控制策略。 www.ibm.com 2. Database access is controlled by the Access Control List (ACL) of each database. 数据库访问是由每个数据库的访问控制列表(AccessControlList,ACL)控制的。 www.ibm.com 3. A utilization service support tenants to maintain and configure their specific organization structure and access control data. 利用服务支持租户维护和配置自己的组织结构和访问控制数据。 www.ibm.com 4. The method had the advantages both in access control and security, further more, it supported various storage media. 新的加密方法与其他文件加密方法相比,具有访问控制方便、安全性好的优点,且支持多种存储介质。 www.joca.cn 5. Gets or sets the file or directory in which access control information can be viewed . 获取或设置可在其中更改访问控制信息的文件或目录。 www.bing.com 6. They provide programmatic access to virtually all Domino elements including designs, access control lists, and documents. 它们提供了对所有的Domino元素的编程访问能力,包括设计、访问控制列表和文档。 www.ibm.com 7. The distinctive address that identifies a NIC is called the Media Access Control (MAC) address. 这个识别网卡的独特地址就是所谓的媒体访问控制(MAC)地址。 www.bing.com 8. Discretionary access control (DAC) is the primary access control mechanism that enables access to SQL objects using privileges and roles. 自主访问控制(DAC)是主要的访问控制机制,通过特权和角色支持访问SQL对象。 www.ibm.com 9. This format is now based on ATOM and enables filtering of the access control information by the client. 这种格式现在基于ATOM并支持由客户机对访问控制信息进行过滤。 www.ibm.com 10. Even if the operating system itself are not shielded stored fully access control, so the invaders even operating system information is safe. 即使操作系统自身也没有被屏蔽储存的完全访问权限,所以入侵者即便控制了操作系统信息也是安全的。 www.bing.com 1. Access Control Lists (ACLs) determining who can access each database and to what extent. 访问控制列表(AccessControlList,ACL)确定谁能在多大范围内访问每个数据库。 www.ibm.com 2. The system is compatible with Mercury Security access control panels. 该系统与水银的安全访问控制面板兼容。 www.21csp.com.cn 3. Applicability of controls Introduction application access control. 控制介绍应用访问控制的适用性。 www.securitycn.net 4. This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic. 并提出利用权能对资源访问控制策略进行描述,动态维护。 www.ceps.com.tw 5. Explains the architecture of ACL classes that are used to enforce access control and audit rules. 解释用于强制访问控制和审核规则的ACL类的结构。 msdn2.microsoft.com 6. This level of access control provides additional administrative control, especially useful for supporting multiple organizations. 这种级别的访问控制提供了额外的管理控制、特别适合支持多个组织。 www.ibm.com 7. An entry in an access control list (ACL) is an access control entry (ACE). 访问控制列表(ACL)中的项是访问控制项(ACE)。 msdn2.microsoft.com 8. To which the access control list entries will be copied. 类型的数组,访问控制列表项将被复制到其中。 www.kuenglish.info 9. Class with the specified identity reference, access control type, property access type, and property set identifier. 使用指定的标识引用、访问控制类型、属性访问类型和属性集标识符来初始化。 msdn2.microsoft.com 10. Gets a FileSecurity object that encapsulates the specified type of access control list (ACL) entries for a particular file. 获取一个FileSecurity对象,它封装特定文件的指定类型的访问控制列表(ACL)项。 msdn2.microsoft.com 1. We require a RBAC model, which can make access control decision based on the context information in a fine-grained, identity- based way. 我们需要一个能够基于上下文进行细粒度访问控制的RBAC模型,即基于对象实例上下文上的访问控制。 www.ceps.com.tw 2. The change you are about to make will result in auditing entries being added to the access control list. 您要做的改动将导致审核项添加到访问控制列表。 angel.w15.5tom.cn 3. Within a virtual portal, sub-administrators can apply access control independently. 在虚拟门户中,次级管理员能够独立地应用存取控制。 www.ibm.com 4. The security policy is used for access control checks, which are performed by the JVM at runtime. 安全策略用于访问控制检查,这是由JVM在运行时执行的。 www.ibm.com 5. In proprietary access control systems, information about these entities and their attributes is kept in repositories. 在专有访问控制系统中,这些实体及其属性的信息保存在资料库中。 www.ibm.com 6. Therefore, to explore a new means of communication has become the hot spot of access control system. 因此,探索一种新的通信方式成为门禁系统的研究热点。 www.13191.com 7. Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2. 访问控制列表(ACL)是具有所有者和索引列表或散列的对象,如图2所示。 www.ibm.com 8. After categories are established, access control rules can be written and enforced. 分类建立后,就可以写入和执行访问控制规则。 www.ibm.com 9. The number of role blocks and explicit role mappings influences the access control performance. 角色块和显式角色映射的数量会影响访问控制性能。 www-128.ibm.com 10. This security hole is due to the lack of receiver and sender access control mechanisms to the delivery tree. 产生这种安全漏洞的原因是缺乏对接受者和发送者接入到转发树的控制。 www.fabiao.net 1. Currently, the country's shrinking machine electrical control system is widely adopted in the traditional relay - access control methods. 目前,我国的缩水机电气控制系统普遍采用的是传统的继电器—接触器控制方式。 www.lwtxw.com 2. The path to a directory containing a DirectorySecurity object that describes the file's access control list (ACL) information. 包含DirectorySecurity对象的目录的路径,该对象描述文件的访问控制列表(ACL)信息。 msdn2.microsoft.com 3. Removes the first occurrence of a specific access control entry from the access control list. 从访问控制列表移除特定访问控制项的第一个匹配项。 msdn2.microsoft.com 4. Searches for an access control rule that exactly matches the specified rule and, if found, removes it. 搜索与指定的规则完全匹配的访问控制规则,如果找到则将其移除。 msdn2.microsoft.com 5. For more information, see "Types of Groups Used in Access Control Lists" later in this topic. 有关详细信息,请参阅本主题后面的“在访问控制列表中使用的组类型”。 technet.microsoft.com 6. Which of the following commands applies to an access control list to a router interface? 下列哪一个命令用来把一个访问列表应用到一个路由器的端口上? bbs.kaibi.com.cn 7. XACML (Extensible Access Control Markup Language) for federated authorization and access control. 联邦授权和访问控制的XACML(可扩展访问控制标记语言) www.infoq.com 8. Traditional access control model hardly consider the issue of subjects' trust worthiness and privilege partition. 传统访问控制模型在授权过程中没有考虑主体的信任度和权限集合划分等问题。 www.ceps.com.tw 9. Represents the Windows access control security for a named semaphore. 表示命名的信号量的Windows访问控制安全性。 msdn2.microsoft.com 10. The information in rules is merged if possible, to maintain the smallest number of access control entries. 尽可能将规则中的信息合并,以便使访问控制项的数量维持在最小值。 msdn2.microsoft.com 1. The thesis researches on the identity authentication and access control in information security technology. 本文从身份认证、访问控制等方面对信息安全的相关技术进行了分析和研究。 www.fabiao.net 2. The change you are about to make will result in 10 permissions that propagate to child objects being added to the access control list. 您要做的改动将导致10个传播到子对象的权限添加到访问控制列表。 angel.w15.5tom.cn 3. Class with the specified identity reference , access control type , and extended right identifier . 使用指定的标识引用、访问控制类型和扩展权限标识符来初始化。 www.bing.com 4. First, the paper presents the basic knowledge of XML and XML Access Control Language used to access control to XML document. 论文首先介绍了XML的基础知识并在此基础上讨论了XML访问控制语言,用它来实现对XML文档的访问控制。 www.fabiao.net 5. These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes. 这些属性包括文件所有者及组权限,访问控制列表(ACL),以及扩展文件属性。 www.ibm.com 6. Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication. 通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。 www.ibm.com 7. It also contains security namespace information and access control policies on all the Cognos objects. 它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。 www.ibm.com 8. Determines whether the access control list contains a specific access control entry. 确定访问控制列表是否包含特定的访问控制项。 msdn2.microsoft.com 9. Gets flags that specify the inheritance properties of this Access Control Entry (ACE). 获取指定此访问控制项(ACE)的继承属性的标志。 msdn2.microsoft.com 10. Returns the specified sections of the access control security for the current registry key. 返回当前注册表项的访问控制安全性的指定部分。 www.showxiu.com 1. Not surprisingly, in this article's example, the subject of access control is the user calling an MDM service. 在本文的例子中,访问控制主体就是调用MDM服务的用户,这毫不奇怪。 www.ibm.com 2. The enforcement of proper usage permission is commonly achieved by access control, or by encrypting the content for distribution. 正确使用许可权的执行通常是通过控制接入和为内容流通进行加密。 www.cyberport.com.hk 3. The communication protocol is designed in term of three layers: Physical Layer, Media Access Control Layer and Logic Link Control Layer. 本通信协议分为物理层、介质访问控制层和逻辑链路控制层三层设计。 www.fabiao.net 4. Access control security strategy is to preserve the legality of the database users. 访问控制策略即保证数据库的访问者其身份的合法性。 www.fabiao.net 5. The service access control list (ACLs) settings for front-end servers are identical to the service ACLs settings for back-end servers. 前端服务器的服务访问控制列表(ACL)设置与后端服务器的服务ACL设置完全相同。 technet.microsoft.com 6. Access control for regulating who has access to the hardware and software containing financial information . 访问控制必须到位,严格限制财务信息系统相关的软硬件的访问。 www.bing.com 7. The application instance shows that the pro-posed fuzzy access control for pervasive computing is effective. 应用实例分析表明,提出的面向普适计算的模糊访问控制是有效的。 fcst.ceaj.org 8. The post identifies some of the "gaps" in existing identity solutions especially related to access control. 文中还指出了一些已有的身份识别解决方案的缺陷,尤其在访问控制方面。 www.infoq.com 9. Create a portable and standard way of describing access control entities and their attributes. 创建一种可移植的、标准的方式来描述访问控制实体及其属性。 www.ibm.com 10. XML data management system mainly solve the XML data storage management, query processing, access control, data updates. XML数据管理系统主要解决XML数据的存储管理、查询处理、访问控制、数据更新等。 www.fabiao.net 1. The Advanced Access Control Feature implements label-based access control (LBAC) to offer row-level and column-level protection. AdvancedAccessControlFeature实现了基于标签的访问控制(LBAC),以提供行级和列级保护。 www.ibm.com 2. This logic especially makes sense in scenarios with many updates of the access control configuration. 这种逻辑对于大量更新访问控制配置的情况特别有用。 www.ibm.com 3. Creates a new access control rule for the specified user, with the specified access rights, access control, and flags. 使用指定的访问权限、访问控制和标志为指定用户创建新的访问控制规则。 msdn2.microsoft.com 4. Access control must be included to allow for private and semi-private annotations. 访问控制必须包括对于私有的和半私有的注释的考虑。 www-128.ibm.com 5. And use access control lists properly to reduce the risk of a denial-of-service attack. 中的建议,并正确地使用访问控制列表,以降低受到拒绝服务攻击的风险。 msdn2.microsoft.com 6. This reduces the size of the ACL without affecting the access control semantics it grants. 这样可以缩减ACL的大小而不影响它所授予的访问控制语义。 msdn2.microsoft.com 7. C. Security: Coordinate installation of door hardware, keying, and access control with Owner's security consultant. 安全:与业主的安全顾问沟通,协调门五金、钥匙和门控五金的安装。 gigabase.org 8. XACML is an initiative to develop a standard for access control and authorization systems. XACML的初衷是开发一项访问控制和授权系统的标准。 www.ibm.com 9. TAMOS addresses these concerns by providing operating system-level access control for UNIX and Linux operating systems. TAMOS通过为UNIX和Linux提供操作系统级访问控制来解决这些问题。 www.ibm.com 10. But he adds that if role-based access control is enforced too strictly, employees have too little data to do their jobs. 同时MrJohnson也提到如果过于严苛的执行以职位为基础的权限管理,员工将仅仅获取微少的工作所需数据。 www.ecocn.org 1. The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal. “门户管理”还可以管理访问控制列表(ACL),以便为门户确定角色和权限映射。 www.ibm.com 2. Our clients take advantage of both role-based permission and fine-grained access control. 我们的客户同时利用基于角色的权限和细粒度访问控制。 www.ibm.com 3. Provides the ability to control access to directory objects without direct manipulation of Access Control Lists (ACLs). 提供无需直接操作访问控制列表(ACL)而控制对目录对象的访问的能力。 msdn2.microsoft.com 4. Using black-box model to describe workflow system with local dynamic to illustrate the state-based dynamic access control. 采用黑盒子建模思想描述局部具有动态特征的工作流系统。 www.ceps.com.tw 5. The access control list specifies the logins used by pull and immediate-updating subscriptions to access this publication. 访问控制列表指定访问此发行物的接收和立即更新预订使用的登录。 www.jukuu.com 6. Class with the specified identity reference, access control type, property access, and property type. 使用指定的标识引用、访问控制类型、属性访问和属性类型来初始化。 msdn2.microsoft.com 7. Review operating system security and Windows access control lists (ACLs) on the server that hosts the custom server controls. 查看承载自定义服务器控件的服务器上的操作系统安全性和Windows访问控制列表(ACL)。 msdn2.microsoft.com 8. Add a permission hook onto the reference field to set access control when changing a defect record. 在关联字段上增加一个permissionhook,在改变一个缺陷记录时设置控制权限。 www.ibm.com 9. Web Services Manager supports run-time governance including policy-oriented security and access control. Web服务管理器支持运行时治理,包括面向策略的安全性与访问控制。 www.infoq.com 10. Wiki's are editable at a central place and access control can be given to people who need it. wiki是可编辑的,位于一个中心位置,可以根据需要授予用户对它的访问权。 www.ibm.com 1. This type of access control is suitable for applications with multiple types of users and multiple privilege levels. 这种类型的访问控制适用于有多种用户类型和多个特权级别的应用程序。 www.ibm.com 2. Represents the Windows access control security for a registry key. 表示注册表项的Windows访问控制安全性。 msdn2.microsoft.com 3. However, existing access control mechanisms are insufficient or add too much overhead to get the desired results. 然而,现有的访问控制机制要么是不够好,要么是开销过大。 www.ibm.com 4. FileIOPermission for permission to enumerate access control list (ACL) for a directory. FileIOPermission表示枚举目录的访问控制列表(ACL)的权限。 msdn2.microsoft.com 5. Using the URL for access control, or security-sensitive decisions can expose your application to canonicalization security vulnerabilities. 使用URL进行访问控制或安全敏感性决策会将应用程序暴露在规范化安全漏洞之下。 msdn2.microsoft.com 6. Applies access control list (ACL) entries described by a DirectorySecurity object to the specified directory. 将DirectorySecurity对象描述的访问控制列表(ACL)项应用于指定的目录。 msdn2.microsoft.com 7. The Community section provides asset review and approvals, access control, and notifications. Community部分提供资产审查和批准、访问控制和通知。 www.ibm.com 8. You can design access control policies to grant authority to a user based on their role in a particular organization. 您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。 www.ibm.com 9. If the named system mutex does not exist, it is created with the specified access control security. 如果已命名的系统互斥体不存在,则使用指定的访问控制安全性创建它。 msdn2.microsoft.com 10. Is there an employee identification system in place for positive identification and access control purposes? 有员工身份识别系统可以准确识别和控制出入权限吗?。 www.6sq.net |
||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。