Echoecho routes around this problem by using a very nifty permission-based solution.
双重回音通过使用一流的许可方式来解决这个问题。
And the spam cops are out there ready to close you down if you are not thoroughly permission-based.
而垃圾邮件警察在那里,准备关闭你失望,如果你还没彻底许可为基础的。
And the spam cops are out there, ready to close you down if you are not thoroughly permission-based.
而垃圾邮件警察在那里,准备关闭你失望,如果你还没彻底许可为基础的。
Using EXECUTE AS with a login-less user is more secure because it is permission-based, not password-based.
对于很少登录的用户使用EXECUTEAS比较安全,因为它基于权限,而不基于密码。
Reciprocity works in the same that permission-based marketing does; you give something to get something at every step in the process.
“互惠”和基于许可的行销的运作方式是同样的,在这个过程中每一步你都要给出某样东西来获得某样东西。
48% of respondents who receive permission-based email from a travel company said the email has a direct impact on offline purchases.
同意接收旅游公司发送的邮件的人中,有48%认为电子邮件对线下购买产生了直接的影响。
Reciprocity works in the same that permission-based marketing does; you give something to get something at every step in the process.
“互惠”和基于许可的行销的运做方式是同样的,在这个过程外每一步你都要给出某样东西来获得某样东西。
Nearly every modern OS makes use of a bit-masking permission-based model that deals with the control of resources by principals, based on principals and groups.
几乎每个现代操作系统都使用基于位屏蔽权限的模型,该模型基于主体和组按主体处理资源控制。
Email may have taken a backseat role to social media hype, but it's still a very powerful tool when used correctly. It is the cornerstone of permission-based relationship marketing.
虽然电子邮件对于社会媒体宣传来说可能处于次要作用,但如果正确使用的话,它仍然是一个非常强大的工具。
Permission is granted not only based on the CodeSource but also on the user executing the code.
许可权的授予不仅基于CodeSource,还基于执行代码的用户。
The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.
J2EE安全模型以方法权限为基础,因此对于细粒度的安全访问来说,它既不切实际又很麻烦。
Our clients take advantage of both role-based permission and fine-grained access control.
我们的客户同时利用基于角色的权限和细粒度访问控制。
Role-based permission system to define access to the viewing and editing of content.
基于角色的权限系统,可以控制对内容的查看和编辑权限。
A role-based permission lookup example.
基于角色权限查找的范例。
JACC enables authorization decisions based on these permission classes.
JACC允许根据这些permission类进行授权决策。
Whether this action can be performed by Chris or not is completely constrained by the permission lookup rules stated in the Role-based permission lookup process description.
Chris是否能够执行该操作,完全由 Role-based permissionlookupprocess描述中陈述的权限查找协议所决定。
It's based on giving access to your information to a limited set of the people you know. No one can see your profile at all without your explicit permission.
它只让认识你的人访问你的资料。
Based on RBAC model, this paper introduces negative authorization into the user assignment and permission assignment, and discusses their realizing approaches and features.
本文在RBAC模型基础上,分别在用户分配和权限分配中引入了负授权,讨论了负授权的实现方式及其特点。
Based on RBAC model, the paper adds user group, role group to extend the model from user, role and permission.
在RBAC模型的基础上引入用户组、角色组的概念,从用户、角色和权限三个方面对R BAC模型进行了扩展。
Combined with real requirement, this paper sets out design and realization of permission system based on the extended model.
本论文结合实际应用系统的需求,设计并实现了基于扩展模型理念的权限系统。
Based on the RBAC model and related role inheritance rules, concepts such as permission group and an improved role hierarchy and permission hierarchy model are introduced.
基于对RBAC模型及相关模型中角色继承规则,引入权限组等概念,提出了一个改进的角色与权限层次关系模型。
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
Objective :The purpose of this study was to explore the significance of informing the patients and gaining their permission with their signatures based on the ideas of patient-centered service.
目的:遵循以病人为中心的服务思想,探讨重要护理活动告知患方认可签字制度的实施。
With the invention adopted, display result of cases can be filtered according to the user permission to realize case retrieval based on user permission.
通过使用本发明,可以根据用户的使用权限对案例的展示结果进行过滤,实现了基于用户使用权限的案例检索。
For example, a permission request might not be necessary if the code simply computes a result based on inputs passed to it, without using any resources.
例如,如果代码只根据向它传递的输入来计算结果而不使用任何资源,则可能不必请求权限。
In 2008, the MEP denied permission to, or suspended, projects based on the results of their environmental-impact assessments (EIA).
在2008年,环保部基于环境影响评估(环评)的结果而否定或暂停了一些项目。
In 2008, the MEP denied permission to, or suspended, projects based on the results of their environmental-impact assessments (EIA).
在2008年,环保部基于环境影响评估(环评)的结果而否定或暂停了一些项目。
应用推荐