• Acl: An access control list specification.

    acl一个访问控制列表规范

    youdao

  • The method might be an access control list for example.

    这个方法可能例子访问控制清单

    youdao

  • This article is on an access control technology for.

    篇文章访问控制技术

    youdao

  • Notesaclentry represents a single entry in an access control list.

    描述访问控制列表中的条目

    youdao

  • Implementing an access control policy usually consists of two steps.

    实现访问控制策略通常包含两个步骤

    youdao

  • Add an access control hook on the actions of the defect record type.

    缺陷记录action增加一个access controlhook

    youdao

  • So there has much extra work to manage such an access control system.

    其中存在大量余的工作,特别同构单元数量很多时授权管理非常困难。

    youdao

  • This section shows you how to configure IF to implement an access control policy.

    节将展示如何配置IF实现访问控制策略

    youdao

  • Assigns access rights to the queue based on the contents of an access control entry.

    根据存取控制项目内容指派伫列存取权限

    youdao

  • An access control list is a list of permissions or sets of permissions securing a resource.

    访问控制列表权限列表保护资源权限

    youdao

  • This is the interface used for representing one entry in an Access Control List (ACL).

    接口用来表示访问控制列表中(acl)的一个入口

    youdao

  • One method to satisfy the access authority on file access is to implement an access control list (ACL).

    文件访问进行访问授权方法实现访问控制列表 (ACL)。

    youdao

  • The implement of the model depends on a message processing security model and an access control model.

    模型依赖于消息安全处理模型访问控制模型。

    youdao

  • Represents a combination of a user's identity, an access mask, and an access control type (allow or deny).

    表示用户标识访问访问控制类型(允许拒绝)组合

    youdao

  • Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL).

    提供访问控制列表 (ACL)中的访问控制ACE能力

    youdao

  • An access rule represents a combination of a user's identity, an access mask, and an access control type (allow or deny).

    访问规则表示用户标识、访问访问控制类型(允许拒绝)组合

    youdao

  • An access control mechanism is given for the protection of the resource module in the object oriented programming systems.

    给出了用于保护面向对象编程系统资源模块访问控制机制

    youdao

  • This paper provides an access control mechanism within collaborative CAD, based on a technique we call role-based viewing.

    提出协同CAD信息存取机制,这种机制是以基于角色的视图技术为基础的。

    youdao

  • An administrator can also assign an access control list to each work node for additional security control at the work node level.

    管理员可以每个工作节点分配访问控制列表进一步工作节点级别上进行安全控制。

    youdao

  • You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.

    详细了解配置Acegi 的方法,从而LDAP目录交互实现访问控制策略

    youdao

  • Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.

    AccessManager创建一些测试对象用户受保护资源然后添加访问控制列表策略

    youdao

  • This model can resolve various security problem of current applications, and can be extended to an access control model for the different domains.

    模型可以很好地解决现在一些系统存在安全问题并且可以扩展成多域之间的安全互访问模型。

    youdao

  • If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.

    如果存在必须相应地使用文件系统中的代码访问安全机制访问控制列表来保护包含这些文件目录

    youdao

  • For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.

    现在只需了解拦截可以拦截用户在用户访问bean之前实现访问控制策略

    youdao

  • For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    youdao

  • Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML.

    针对网格环境下资源访问控制特点提出一个基于使用控制模型UCON结合XACMLSAML访问控制模型

    youdao

  • The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.

    管理员配置分配每个过程访问控制列表这样存在定义过程能够什么的业务控制。

    youdao

  • To provide a direct and precise description for workflow access control, an access control model for workflow systems was developed based on graph and graph transformation.

    为了直观准确地描述工作流访问控制,提出了基于工作流访问控制模型

    youdao

  • To provide a direct and precise description for workflow access control, an access control model for workflow systems was developed based on graph and graph transformation.

    为了直观准确地描述工作流访问控制,提出了基于工作流访问控制模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定