• Let's assume the following access rules.

    我们假设以下访问规则。

    youdao

  • As in Part 1, assume the following access rules.

    第1部分一样假设以下访问规则。

    youdao

  • These access rules are defined on a project's class path.

    这些访问规则定义工程路径上。

    youdao

  • A few default types always exist with clearly defined access rules.

    通常存在一些带有明确定义的访问规则默认类型

    youdao

  • Read access rules are applied when a user attempts to read labeled data.

    用户试图带安全标签数据时,则应用访问规则

    youdao

  • If any of the access rules are violated, the user is denied access to data.

    如果违反任意一访问规则则拒绝用户访问数据

    youdao

  • LBAC read access rules are enforced while reading from source table, however.

    然而,在读取数据期间LBAC读取访问规则执行

    youdao

  • Action is taken if this condition is not met, as denoted in the access rules.

    如果条件满足按照访问规则采取行动

    youdao

  • LBAC read access rules are enforced while reading from both source and target tables.

    目标读取数据的过程中,LBAC读取访问规则执行

    youdao

  • After you have established roles, you can create access rules in your application.

    建立角色可以应用程序创建访问规则

    youdao

  • Access rules can be divided into two categories: read access rules and write access rules.

    访问规则可以划分访问规则访问规则。

    youdao

  • Exemptions provide a way to allow users to bypass one or more access rules for a security policy.

    豁免权用户绕过安全策略中的多个访问规则提供了一种方式

    youdao

  • IDS has a predefined set of read and write access rules that are collectively called IDSLBACRULES.

    IDS预定义访问规则,它们被统称为IDSLBACRULES。

    youdao

  • If you want to restrict access to static files, configure access rules for those files in IIS.

    如果限制静态档案存取,请IIS中设定这些档案存取规则

    youdao

  • The utility tcpdmatch is a good tool for initially testing access rules before putting them in place.

    tcpdmatch工具非常适于在设置访问规则之前进行初始测试

    youdao

  • Server runtime is made up of the class libraries and their access rules for a specific type and version of server.

    服务器运行及其特定类型版本服务器的访问规则

    youdao

  • Write access rules are applied when data is written (INSERT, UPDATE, and DELETE operations) and can be summarized as follows.

    用户数据时(INSERTUPDATEDELETE操作),应用访问规则,写访问规则总结如下

    youdao

  • The read access rules are applied when data is read (SELECT, UPDATE, and DELETE operations) and can be summarized as follows.

    用户数据时(SELECTUPDATEDELETE操作),则应用访问规则,读访问规则总结如下。

    youdao

  • In this model, the access rules and the access control attributes are defined. The relations for the access control are set up.

    模型本体中的类定义访问规则访问控制属性,并由此建立了访问控制关系

    youdao

  • The DB2 LBAC approach is to allow users to define the set of components that make up a security label and to specify the access rules.

    DB2LBAC方法允许用户定义一组组件,以构成一个安全标签允许用户指定访问规则

    youdao

  • It analyzed the concepts of resource names, resource addresses, access rules, and addressing system formally in layered iteration model.

    结合模型形式化地分析了层次迭代模型中的资源名称、资源地址访问规则寻址系统概念

    youdao

  • If necessary, we could also add a Protected object Policy (POP) to any object, which adds additional protection, such as time-of-day access rules.

    有必要我们可以任何对象添加保护对象策略(Protected Object Policy,pop),从而提供额外的保护时段访问规则等。

    youdao

  • Notice that the public areas in each building need no ACL; you only need to create an ACL when the access rules for a resource deviate from that of the parent resource.

    注意每个大楼中的公共区域需要任何ACL资源访问规则偏离上一级资源访问规则时,只需创建 ACL。

    youdao

  • Data services also perform a critical governance function - they help centralize metrics, monitoring, version management, reuse of data types, and enforce data visibility and access rules.

    数据服务能够执行关键治理职能——它们有助于度量指标集中化监视版本管理、数据类型重用以及执行数据可视化访问规则

    youdao

  • An appeals court rejected the Securities and Exchange Commission's proxy-access rules, which were designed to make it easier for large shareholders to propose candidates for corporate boards.

    一个上诉法庭驳回证券交易委员会代理访问规则这个规则用来使股东方便提出公司的董事会成员候选人

    youdao

  • Rules for access control are configured as Security Rules.

    访问控制规则配置安全规则。

    youdao

  • An online policy holds one or more encryption keys and rules for access control.

    在线策略包含一个多个加密密以及访问控制规则

    youdao

  • In this case, the mobile cloud conceivably can enhance enforcement of access control rules.

    这种情况下移动会理所当然增强访问控制规则实施

    youdao

  • Filtering based on portal access control or personalization rules would be more efficient here.

    此处根据门户访问控制个性化规则进行筛选更为有效

    youdao

  • Filtering based on portal access control or personalization rules would be more efficient here.

    此处根据门户访问控制个性化规则进行筛选更为有效

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定