单词 | access control lists | ||||||||||||||
释义 | access control lists
更多释义 收起释义 例句释义: 访问控制列表,存取控制清单,存取控制列表 1. Because these objects are used in public folder access control lists (ACLs), it is crucial that this information be replicated correctly. 由于这些对象是在公用文件夹访问控制列表(ACL)中使用的,因此,正确复制此信息是至关重要的。 technet.microsoft.com 2. As you know, you can also provide access-control lists. 我们知道,您还可以提供访问控制列表。 www.ibm.com 3. This case will illustrate how different access control lists interact with a given set of queues. 这个用例将展示不同访问控制列表与特定队列集之间的交互。 www.ibm.com 4. The inclusion of both field-level and instance-level access control lists satisfies the requirement for a thorough access-control mechanism. 包含有字段级和实例级访问控制列表满足了完全的访问控制机制的需求。 www-128.ibm.com 5. In one sense, Acegi is an attempt to apply OS-like access control lists to the Java EE environment. 在某种意义上说,Acegi是将像操作系统一样的访问控制列表应用到JavaEE环境的一种尝试。 www.ibm.com 6. Folder access control lists ( ACLs ) will not be preserved when recovering content into an active mailbox . 将内容恢复到活动邮箱中时,不会保留文件夹访问控制列表(ACL)。 www.bing.com 7. OmniFind can be configured to associate documents with security tokens or access control lists. OmniFind可以配置来将文档与安全令牌或访问控制列表相关联。 www.ibm.com 8. This new approach will help eliminate redundant access control lists and allows companies to quickly react to changing business conditions. 这一方法有助于减少冗余的存取控制列表,从而使得企业可以根据事务环境的变化迅速作出调整。 bbs.translators.com.cn 9. They provide programmatic access to virtually all Domino elements including designs, access control lists, and documents. 它们提供了对所有的Domino元素的编程访问能力,包括设计、访问控制列表和文档。 www.ibm.com 10. Access Control Lists (ACLs) determining who can access each database and to what extent. 访问控制列表(AccessControlList,ACL)确定谁能在多大范围内访问每个数据库。 www.ibm.com 1. Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2. 访问控制列表(ACL)是具有所有者和索引列表或散列的对象,如图2所示。 www.ibm.com 2. For more information, see "Types of Groups Used in Access Control Lists" later in this topic. 有关详细信息,请参阅本主题后面的“在访问控制列表中使用的组类型”。 technet.microsoft.com 3. These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes. 这些属性包括文件所有者及组权限,访问控制列表(ACL),以及扩展文件属性。 www.ibm.com 4. And use access control lists properly to reduce the risk of a denial-of-service attack. 中的建议,并正确地使用访问控制列表,以降低受到拒绝服务攻击的风险。 msdn2.microsoft.com 5. Provides the ability to control access to directory objects without direct manipulation of Access Control Lists (ACLs). 提供无需直接操作访问控制列表(ACL)而控制对目录对象的访问的能力。 msdn2.microsoft.com 6. Review operating system security and Windows access control lists (ACLs) on the server that hosts the custom server controls. 查看承载自定义服务器控件的服务器上的操作系统安全性和Windows访问控制列表(ACL)。 msdn2.microsoft.com 7. This module provides authorization services against file-system access-control lists (ACLs). 此模块提供针对文件系统访问控制列表(ACL)的授权服务。 msdn2.microsoft.com 8. It also helps you secure the connection string information using access control lists (ACLs) and encryption. 此外,还可以帮助您使用访问控制列表(ACL)和加密保护连接字符串信息。 msdn2.microsoft.com 9. Similarly, the user must have the correct access control lists for creating or writing to settings. 同样,用户必须有创建或写入设置的正确的访问控制列表。 msdn2.microsoft.com 10. Operating system security and access control lists (ACLs) on the server that hosts the custom server control. 承载自定义服务器控件的服务器上的操作系统安全性和访问控制列表(ACL)。 msdn2.microsoft.com 1. Control over access to topics will normally be managed by the publication engine based on access control lists on a topic hierarchy. 对主题访问的控制将通常由发布引擎基于主题层次结构中的访问控制列表进行管理。 www.ibm.com 2. Access-control lists based on principals are also applied to individual annotations. 基于主体的访问控制列表同样也适用于单独的注释。 www-128.ibm.com 3. Visibility of reports and views can be limited to certain team members based on access control lists. 可以通过存取控制表来限制报告及视图对某些团队成员的可见性。 www.ibm.com 4. For more information, see ASP. NET Required Access Control Lists (ACLs). 有关更多信息,请参见ASP.NET必需的访问控制列表(ACL)。 msdn2.microsoft.com 5. CM provides a lot of possibilities for mapping your requirements to privilege sets and access control lists. CM为将需求映射到权限集和访问控制列表提供了很多的方法。 www.ibm.com 6. Access control lists let you define fine-grained permissions for files. 访问控制表让您定义细粒度的文件许可权。 www-128.ibm.com 7. Access Control Lists define the level of access on a particular CM entity for users and user groups. 访问控制列表为用户和用户组定义了对特定CM实体的访问级别。 www.ibm.com 8. For details, see "Unknown Users in Access Control Lists" later in this topic. 有关详细信息,请参阅本主题后面的“访问控制列表中的未知用户”。 technet.microsoft.com 9. GSD supports access control lists (ACL) based sharing. GSD支持基于共享的访问控制列表(ACL)。 www.infoq.com 10. The earliest forms of access control on the mainframe were based on manually maintained access control lists (ACLs). 在大型机上最早的访问控制方式是基于手动维护的访问控制列表(ACLs)。 www.infoq.com 1. Access control lists (ACLs) can have a mixture of users from different authentication providers. 访问控制列表(ACL)可以包含来自不同验证提供程序的用户。 office.microsoft.com 2. Permissions are set using access control lists. 权限是使用访问控制列表设置的。 technet.microsoft.com 3. Google Storage is worth the trouble, mainly because it supports powerful access controls through access control lists (ACLs). GoogleStorage是值得花大精力的,这主要是因为它支持通过访问控制列表(ACL)实现的强大访问控制。 www.ibm.com 4. There are two types of access control lists: discretionary and system. 有两种类型的访问控制列表:自定义访问控制列表和系统访问控制列表。 technet.microsoft.com 5. Microsoft SQL Server Express mountable files must be properly secured by access control lists (ACLs) and SQL authentication. 必须通过访问控制列表(ACL)和SQL身份验证来正确地保护MicrosoftSQLServerExpress可装载文件。 msdn2.microsoft.com 6. Check the access control lists (ACLs) on the files under '%1' and make sure the Microsoft Exchange Transport service can access them. 请检查“%1”下各文件的访问控制列表(ACL),确保MicrosoftExchange传输服务可以访问它们。 www.microsoft.com 7. In this step, please load the data from the First Step to create the necessary users, groups, and access control lists (for example: ACL's). 在这一步中,请加载第一步中的数据,以创建必要的用户、组和访问控制列表(如ACL)。 www.ibm.com 8. The SECEDIT command does not set the access control lists on all the folders that are listed in a security template SECEDIT命令不会设置针对安全模板中列出的所有文件夹的访问控制列表 support.microsoft.com 9. Troubleshoot and test all connectivity and access control lists 故障排除,测试所有的连通性和访问控制列表 cna.impu.edu.cn 10. Types of Groups Used in Access Control Lists 在访问控制列表中使用的组类型 technet.microsoft.com 1. Research on the security of network based on the access control lists of a router 基于路由器访问表的网络安全研究 www.ilib.cn 2. The Application of Access Control Lists to Routers 访问控制列表在路由器上的应用 www.ilib.cn 3. Generic Access Control Lists with PHP 基于PHP的通用访问控制列表 blog.csdn.net 4. Unknown Users in Access Control Lists 访问控制列表中的未知用户 technet.microsoft.com 5. You can restrict file access by using NTFS access control lists and the 通过使用NTFS访问控制列表和 msdn2.microsoft.com 6. Reviewing Access Control Lists Created for SQL Server Service Accounts 查看为SQLServer服务帐户创建的访问控制列表 msdn2.microsoft.com |
||||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。