• After categories are established, access control rules can be written and enforced.

    分类建立,就可以写入执行访问控制规则

    youdao

  • In this case, the mobile cloud conceivably can enhance enforcement of access control rules.

    这种情况下移动会理所当然增强访问控制规则实施

    youdao

  • The methods of describing access control rules and policies under this frame - work are also given.

    论文介绍了框架描述访问控制规则策略方法

    youdao

  • You can capture Access Control Rules in XACML and reference life cycle states and semantic annotations such as classifications, and properties.

    可以XACML 中捕获访问控制规则引用生命周期状态诸如分类属性等语义标注

    youdao

  • Identity and access database is the LDAP database which stores information of users, groups, roles, resources, functions and access control rules and so on.

    身份权限数据库一个LDAP数据库,用于存储用户身份、用户角色资源功能访问控制规则信息

    youdao

  • An online policy holds one or more encryption keys and rules for access control.

    在线策略包含一个多个加密密以及访问控制规则

    youdao

  • The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.

    架构需要涉及许多问题安全性访问控制服务水平协议,直到业务工作流事件处理信息管理和业务规则。

    youdao

  • Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.

    自适应用户界面能使遵循信息访问控制相关不断变化规则规定变得更为简单。

    youdao

  • Filtering based on portal access control or personalization rules would be more efficient here.

    此处根据门户访问控制个性化规则进行筛选更为有效

    youdao

  • Rules for access control are configured as Security Rules.

    访问控制规则配置安全规则。

    youdao

  • Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    安全策略定义安全标签组成指定控制敏感数据访问规则

    youdao

  • IBM InfoSphere Guardium encryption Expert protects data with a policy that contains one or more encryption keys and one or more rules for access control.

    IBMDatabaseEncryptionExpert使用包含一个多个密密个或多个访问控制规则策略保护数据

    youdao

  • The policies that encryption Expert USES contain one or more encryption keys and one or more rules for access control. There are two types of policies.

    EncryptionExpert使用策略包含多个密密以及一个或多个用于访问控制规则

    youdao

  • If the client is allowed access based on the allowed rules, then TCPD hands over control to the real daemon that was called (in this case, telnetd).

    如果客户端符合允许访问规则那么tcpd就会交出调用实际守护进程控制权(例中telnetd)。

    youdao

  • ACLs use access control entries (ACE) to control user and group access and denial. Though more commonly known as rules, they are.

    ACL使用访问控制条目(ace)控制用户的访问权。

    youdao

  • Expresses access-control rules as simple XML documents.

    访问控制规则表示简单XML文档

    youdao

  • When you get the set of all audit rules for an event, the set contains the minimum number of rules currently required to express all the access control entries.

    获取某个事件所有审核规则集合时,集合包含当前表示所有访问控制项所需要最低数量的规则。

    youdao

  • When you get the set of all audit rules for a registry key, the set contains the minimum number of rules currently required to express all the access control entries.

    获取某个注册表项所有审核规则集合时,集合包含当前表示所有访问控制项所需要最低数量的规则。

    youdao

  • The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).

    安全管理员可以通过应用protectedobjectpolicies (POP)access controllists (acl)规则指定安全等级

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • Improve the rules of comparing the security label, which meet the practical demand of the Access Control for spatial database.

    改进安全比较规则使得更适合现实空间数据存取控制需求

    youdao

  • After analyzing the excessive filtering rules, a solution to increase the performance of network access control equipment is proposed.

    分析过量规则网络访问控制设备性能影响,讨论针对这问题的解决方法

    youdao

  • The paper puts forward a delegation logic based access control model (DLBAC). It translates the credentials, RBAC elements and access policies into unified delegation logic rules.

    提出一种基于委托逻辑访问控制模型——dlbac,将凭证RBAC元素访问策略转化为统一的委托逻辑规则

    youdao

  • In this model, the access rules and the access control attributes are defined. The relations for the access control are set up.

    模型本体中的类定义访问规则访问控制属性,并由此建立了访问控制关系

    youdao

  • Section 7.2.5, "Access Control, Stage 2: Request Verification", describes the rules for this.

    第7 . 2.5节“访问控制阶段2请求验证描述了这一点的规则

    youdao

  • It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.

    统一描述策略元素安全规则支持多种访问控制模型体现良好通用性

    youdao

  • The access control algorithm is used to conduct XML document protection according to the security rules.

    访问控制算法根据安全规则XML文档实施保护

    youdao

  • The access control algorithm is used to conduct XML document protection according to the security rules.

    访问控制算法根据安全规则XML文档实施保护

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定