The distinctive address that identifies a NIC is called the Media Access Control (MAC) address.
这个识别网卡的独特地址就是所谓的媒体访问控制(MAC)地址。
A better solution might be to control database object access through the use of schemas.
更好的解决方案可能是通过使用模式控制数据库对象访问。
It is a form of mandatory access control.
它是强制访问控制的一种形式。
It is a container for documents for which access control can be defined.
它是一个文档容器,您可以为其中的文档定义访问控制。
XACML is an initiative to develop a standard for access control and authorization systems.
XACML的初衷是开发一项访问控制和授权系统的标准。
XACML is a flexible standard and allows policy authors to build complex access control policies.
XACML是一个灵活的标准,并且允许策略创建者构建复杂的访问控制策略。
Role determines the access control for a user.
角色决定用户的访问控制。
As a result, you can enforce the access control portion of user management.
因此,可以实施用户管理的访问控制部分。
A security and access control model that distinguishes between these two classes of users.
区分上述两类用户的安全和访问控制模型。
A common way to control access to table data is using views.
控制表数据访问的一种常见方法是使用视图。
You can divide configuring a simple access control policy into two steps.
配置简单的访问控制策略可分为两个步骤。
To collect data for a WebSphere Commerce access control issue.
要为WebSphereCommerce访问控制问题收集数据。
Most of the current systems implement access control and authorization in a proprietary manner.
目前多数系统都以专有的方式实现访问控制和授权。
The research of access control model is a topic of information security area.
访问控制模型是信息安全领域研究的重点之一。
DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.
DB 2提供了基于标签的访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性。
Notesaclentry represents a single entry in an access control list.
描述了一个访问控制列表中的一个条目。
Control access to a class by controlling its instantiation process.
通过控制类的实例化过程来控制对类的访问。
Access control is an important part of the management information system design, a powerful guarantee for the safe operation.
访问控制是管理信息系统设计中的重要环节,是系统安全运行的有力保障。
Provide a surrogate or placeholder for another object to control access to it.
为其他对象提供一种代理以控制对这个对象的访问。
A key challenge in Web services security is the design of effective access control schemes.
一个关键的安全挑战就是要设计有效的访问控制机制。
Embedded controller is a basic access equipment in industry control network.
在工业控制网络中嵌入式控制器是一种基本的接入设备。
RBAC model provide a flexible and efficiency access control model for CSCW.
RBAC模型为CSCW提供了一种灵活,有效的访问控制模式。
The tag defines information about the access control of a WML deck.
标签定义了关于WML平台控制访问信息。
Now I need a mechanism to control the access of this Shared memory.
现在我需要一个机制来控制这个共享内存的访问。
Describes how to remove access to a file under version control.
描述如何移除对版本控制下之档案的存取。
In this paper, we propose a multi-domain RBAC access control model.
本文提出了一种基于RBAC策略的多域网络访问控制模型。
Change the access control list (ACL) for a key container.
更改密钥容器的访问控制列表(acl)。
View the access control list (ACL) for a key container.
查看密钥容器的访问控制列表(acl)。
Access control is a key technique for the security of pervasive computing.
访问控制是普适计算安全的一项关键技术。
Access control is a key technique for the security of pervasive computing.
访问控制是普适计算安全的一项关键技术。
应用推荐