Acl: An access control list specification.
acl:一个访问控制列表规范。
The method might be an access control list for example.
这个方法可能是例子的访问控制清单。
This article is on an access control technology for.
这篇文章是在访问控制技术。
Notesaclentry represents a single entry in an access control list.
描述了一个访问控制列表中的一个条目。
Implementing an access control policy usually consists of two steps.
实现访问控制策略通常包含两个步骤。
Add an access control hook on the actions of the defect record type.
在缺陷记录的action上增加一个access controlhook。
So there has much extra work to manage such an access control system.
其中存在大量冗余的工作,特别在同构单元数量很多时授权管理非常困难。
This section shows you how to configure IF to implement an access control policy.
本节将向您展示如何配置IF来实现访问控制策略。
Assigns access rights to the queue based on the contents of an access control entry.
根据存取控制项目的内容指派伫列的存取权限。
An access control list is a list of permissions or sets of permissions securing a resource.
访问控制列表是权限列表或保护资源的权限集。
This is the interface used for representing one entry in an Access Control List (ACL).
该接口用来表示访问控制列表中(acl)的一个入口。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
The implement of the model depends on a message processing security model and an access control model.
模型依赖于一个消息安全处理模型和一个访问控制模型。
Represents a combination of a user's identity, an access mask, and an access control type (allow or deny).
表示用户的标识、访问掩码和访问控制类型(允许或拒绝)的组合。
Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL).
提供遍历访问控制列表 (ACL)中的访问控制项 (ACE)的能力。
An access rule represents a combination of a user's identity, an access mask, and an access control type (allow or deny).
访问规则表示用户的标识、访问掩码和访问控制类型(允许或拒绝)的组合。
An access control mechanism is given for the protection of the resource module in the object oriented programming systems.
给出了一种用于保护面向对象编程系统的资源模块的访问控制机制。
This paper provides an access control mechanism within collaborative CAD, based on a technique we call role-based viewing.
提出了协同CAD中信息存取的机制,这种机制是以基于角色的视图技术为基础的。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.
您还详细了解了配置Acegi 的方法,从而与LDAP目录交互实现访问控制策略。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
This model can resolve various security problem of current applications, and can be extended to an access control model for the different domains.
该模型可以很好地解决现在一些系统中存在的安全问题,并且可以扩展成多域之间的安全互访问模型。
If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.
如果存在,则必须相应地使用文件系统中的代码访问安全机制或访问控制列表,来保护包含这些文件的目录。
For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.
现在,只需了解拦截器可以拦截用户并在用户访问bean之前实现访问控制策略。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML.
针对网格环境下资源访问控制的特点,提出了一个基于使用控制模型UCON,结合XACML和SAML的访问控制模型。
The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.
管理员配置分配给每个过程的访问控制列表,这样就存在定义该过程中谁能够做什么的业务控制。
To provide a direct and precise description for workflow access control, an access control model for workflow systems was developed based on graph and graph transformation.
为了直观和准确地描述工作流访问控制,提出了一个基于图的工作流访问控制模型。
To provide a direct and precise description for workflow access control, an access control model for workflow systems was developed based on graph and graph transformation.
为了直观和准确地描述工作流访问控制,提出了一个基于图的工作流访问控制模型。
应用推荐