Let's assume the following access rules.
让我们假设以下访问规则。
As in Part 1, assume the following access rules.
与第1部分一样,假设以下访问规则。
These access rules are defined on a project's class path.
这些访问规则定义在工程路径上。
A few default types always exist with clearly defined access rules.
通常存在一些带有明确定义的访问规则的默认类型。
Read access rules are applied when a user attempts to read labeled data.
当用户试图读带安全标签的数据时,则应用读访问规则。
If any of the access rules are violated, the user is denied access to data.
如果违反任意一条访问规则,则拒绝用户访问数据。
LBAC read access rules are enforced while reading from source table, however.
然而,在从源表读取数据期间,LBAC读取访问规则被执行。
Action is taken if this condition is not met, as denoted in the access rules.
如果此条件不满足,就会按照访问规则采取行动。
LBAC read access rules are enforced while reading from both source and target tables.
在从源表及目标表读取数据的过程中,LBAC读取访问规则被执行。
After you have established roles, you can create access rules in your application.
建立角色后,可以在应用程序中创建访问规则。
Access rules can be divided into two categories: read access rules and write access rules.
访问规则可以划分为两类:读访问规则和写访问规则。
Exemptions provide a way to allow users to bypass one or more access rules for a security policy.
豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。
IDS has a predefined set of read and write access rules that are collectively called IDSLBACRULES.
IDS有一组预定义的读和写访问规则,它们被统称为IDSLBACRULES。
If you want to restrict access to static files, configure access rules for those files in IIS.
如果您要限制对静态档案的存取,请在IIS中设定这些档案的存取规则。
The utility tcpdmatch is a good tool for initially testing access rules before putting them in place.
tcpdmatch工具非常适于在设置访问规则之前对其进行初始测试。
Server runtime is made up of the class libraries and their access rules for a specific type and version of server.
服务器运行时由类库及其对特定类型和版本的服务器的访问规则。
Write access rules are applied when data is written (INSERT, UPDATE, and DELETE operations) and can be summarized as follows.
当用户写数据时(INSERTUPDATE和DELETE操作),则应用写访问规则,写访问规则可总结如下。
The read access rules are applied when data is read (SELECT, UPDATE, and DELETE operations) and can be summarized as follows.
当用户读数据时(SELECT、UPDATE和DELETE操作),则应用读访问规则,读访问规则可总结如下。
In this model, the access rules and the access control attributes are defined. The relations for the access control are set up.
该模型为本体中的类定义了访问规则和访问控制属性,并由此建立了访问控制关系。
The DB2 LBAC approach is to allow users to define the set of components that make up a security label and to specify the access rules.
DB2LBAC方法是允许用户定义一组组件,以构成一个安全标签,并允许用户指定访问规则。
It analyzed the concepts of resource names, resource addresses, access rules, and addressing system formally in layered iteration model.
结合模型形式化地分析了层次迭代模型中的资源名称、资源地址、访问规则和寻址系统等概念。
If necessary, we could also add a Protected object Policy (POP) to any object, which adds additional protection, such as time-of-day access rules.
如有必要,我们还可以向任何对象添加受保护对象策略(Protected Object Policy,pop),从而提供额外的保护,如时段访问规则等。
Notice that the public areas in each building need no ACL; you only need to create an ACL when the access rules for a resource deviate from that of the parent resource.
注意,每个大楼中的公共区域不需要任何ACL;当资源的访问规则偏离上一级资源的访问规则时,您只需创建 ACL。
Data services also perform a critical governance function - they help centralize metrics, monitoring, version management, reuse of data types, and enforce data visibility and access rules.
数据服务还能够执行关键的治理职能——它们有助于度量指标的集中化、监视、版本管理、数据类型的重用,以及执行数据可视化和访问规则。
An appeals court rejected the Securities and Exchange Commission's proxy-access rules, which were designed to make it easier for large shareholders to propose candidates for corporate boards.
一个上诉法庭驳回了证券交易委员会的代理访问规则,这个规则用来使大股东更方便地提出公司的董事会成员候选人。
Rules for access control are configured as Security Rules.
访问控制规则被配置为安全规则。
An online policy holds one or more encryption keys and rules for access control.
在线策略包含一个或多个加密密匙以及访问控制规则。
In this case, the mobile cloud conceivably can enhance enforcement of access control rules.
这种情况下,移动云会理所当然地增强访问控制规则的实施。
Filtering based on portal access control or personalization rules would be more efficient here.
此处根据门户访问控制或个性化规则进行筛选会更为有效。
Filtering based on portal access control or personalization rules would be more efficient here.
此处根据门户访问控制或个性化规则进行筛选会更为有效。
应用推荐