An optional latch bolt monitoring switch provides status and facilitates use in access control systems.
在访问控制系统里面,一个可选的碰簧销监测交换机提供的状态和帮助。
In access control, the practice of using one access card for successive use by two or more individuals.
在存取控制中,试图把一张 访 存证给两个或更多人连续使用的行为。
However, HIS System is facing new challenges in Access Control as the Privacy disclosure of Medical Information.
但与此同时,带来了医疗信息隐私泄露问题,给HIS系统的访问控制带来新的挑战。
The method had the advantages both in access control and security, further more, it supported various storage media.
新的加密方法与其他文件加密方法相比,具有访问控制方便、安全性好的优点,且支持多种存储介质。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
So this paper presents a design which use the combination of RFID technology and face recognition technology for identity verification in access control system.
提出了一种在门禁系统中利用RFID技术与人脸识别技术相结合进行身份验证的设计方案。
You can capture Access Control Rules in XACML and reference life cycle states and semantic annotations such as classifications, and properties.
您可以在XACML 中捕获访问控制规则,并引用生命周期状态和诸如分类及属性等语义标注。
In addition, the script can control access and filter information for delivery, as required.
另外,这个脚本能根据需要控制访问权并过滤要交付的信息。
This requires RACF to use several different profiles in various classes to control access to a resource.
这要求RACF在不同的类中使用几个不同的概要文件来控制对资源的访问。
In proprietary access control systems, information about these entities and their attributes is kept in repositories.
在专有访问控制系统中,这些实体及其属性的信息保存在资料库中。
Part 3 of this series will discuss the fine-grained access control model in more detail.
本系列的第3部分将更详细地讨论该细粒度访问控制模型。
See the Resources section to learn more about code source access control and authentication in JAAS.
请参阅参考资料部分以了解更多关于JAAS中代码源访问控制和认证的信息。
This logic especially makes sense in scenarios with many updates of the access control configuration.
这种逻辑对于大量更新访问控制配置的情况特别有用。
It USES the access control definitions provided by the third parameter shown in Listing 9 to make authorization (or access control) decisions.
它使用清单9中第三个参数提供的访问控制定义来指定授权(或访问控制)决策。
Developers face a lack of consistency and common patterns for managing identity and access control in a way that is compatible with REST.
开发人员缺乏针对身份管理和访问控制的连贯和通用模式,即一种与REST兼容的方式。
The post identifies some of the “gaps” in existing identity solutions especially related to access control.
文中还指出了一些已有的身份识别解决方案的缺陷,尤其在访问控制方面。
Later in the article, you'll see the simple access control policy used in building a sample application.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
The system should provide mechanisms to authenticate users with user data residing in the on-premise environment, and authorize with access control data residing in an on-demand environment.
系统应该提供相应的机制,以便使用自行管理环境中的用户数据对用户进行身份验证,并使用按需环境中的访问控制数据进行授权。
Profiles in the MQCMDS class control access to commands (such as define QLOCAL) that provide the ability to define or alter a queue.
MQ cmds类中的概要文件控制对DEFINEQLOCAL等命令的访问,这些命令用于定义和修改队列。
Figure 1 shows the default access control in action.
图1展示了默认的访问控制。
For the first time in TB control, we are enabling access to state-of-the-art technology simultaneously in low, middle and high income countries.
在结核病控制方面,我们使低、中、高收入国家同时获得最先进的技术尚属首次。
A new and exciting feature in DB2 9 is Label Based Access Control (LBAC).
DB 29中一个新的、令人激动的特性是基于标签的访问控制(Label Based Access Control,LBAC)。
Authorization is handled in CM V8 with Access Control Lists (ACLs).
在CMV 8中,授权是通过访问控制列表(Access Control List,ACL)来处理的。
If ignore access control in caches is set to false for a portal page, a completely rendered page will not be cacheable at all.
如果将某个门户页面的忽略缓存中的访问控制设置为False,将不能对完全呈现的页面进行缓存。
The activate method of the document library (Listing 4) registers its roles in the portal access control (PAC) component of WebSphere Portal.
文档库的激活方法在WebSpherePortal 的门户访问控制(PAC)组件中注册它的角色(清单4)。
The fundamental reason is that this ties the store in with the WebSphere Commerce access control model.
根本原因是,这可以与WebSphereCommerce访问控制模型中的商店联系起来。
An administrator can assign users to different roles as defined in the access control section of the Drupal administrative interface.
管理员可以在Drupal管理界面的访问控制部分中为用户分配不同的角色。
When it translates a form into HTML, the Translator stores the original XFDL form in the file cache, and metadata in the access control server.
在将表单转换为HTML 时,Translator 将原来的XFDL 表单存储在文件缓存中,并将元数据存储在访问控制服务器中。
User roles and access control are inherent in Domino's database structure.
用户角色和访问控制都是Domino数据库结构中与生具来的特性。
User roles and access control are inherent in Domino's database structure.
用户角色和访问控制都是Domino数据库结构中与生具来的特性。
应用推荐