Control of access to this water is essential.
水源控制权仍是基本。
Objects can have several levels of access control.
对象可拥有几个级别的访问控制。
The primary value of this approach is to control file system access by applications.
这种方法的主要价值在于控制应用程序对文件系统的访问。
It is a form of mandatory access control.
它是强制访问控制的一种形式。
A better solution might be to control database object access through the use of schemas.
更好的解决方案可能是通过使用模式控制数据库对象访问。
Part 3 of this series will discuss the fine-grained access control model in more detail.
本系列的第3部分将更详细地讨论该细粒度访问控制模型。
Our clients take advantage of both role-based permission and fine-grained access control.
我们的客户同时利用基于角色的权限和细粒度访问控制。
The full capabilities of authentication and access control are beyond the scope of this article.
身份验证和访问控制的完整功能超出了本文的范围。
They are responsible for the control of user access to the network.
他们的责任是控制用户对网络的访问。
As a result, you can enforce the access control portion of user management.
因此,可以实施用户管理的访问控制部分。
Second, the server can take care of access control.
第二,服务器能够进行访问控制;
A security and access control model that distinguishes between these two classes of users.
区分上述两类用户的安全和访问控制模型。
This type of control is called mandatory access control (MAC).
这种控制类型称为强制访问控制(MAC)。
The control logic makes use of COM objects (3) to access the database.
控制逻辑利用COM对象(3)来访问数据库。
Most of the current systems implement access control and authorization in a proprietary manner.
目前多数系统都以专有的方式实现访问控制和授权。
Now, let's look at the important elements of this control-access sequence in more detail.
现在,让我们更详细地看一下这个访问控制序列中的重要元素。
However, this encryption method can not cross the application system to achieve access control of sensitive data.
但是这种加密方式不能越过应用系统,实现应用系统用户对敏感数据的访问控制。
Secondly, we analyze the essence of the security in the access control.
其次,认真分析了访问控制安全性的本质。
Implementing an access control policy usually consists of two steps.
实现访问控制策略通常包含两个步骤。
The Translator consists of two sub-components, the access control server and the file cache.
Translator由两个子组件组成,即访问控制服务器和文件缓存。
Deciding all this is part of an access-control policy.
决定所有这些是访问控制政策的一部分。
An example of calling code in the access control hook of an action.
在一个action的access controlhook中调用代码的一个例子如下。
Add an access control hook on the actions of the defect record type.
在缺陷记录的action上增加一个access controlhook。
The research of access control model is a topic of information security area.
访问控制模型是信息安全领域研究的重点之一。
Access control model is one of the research focuses currently.
访问控制模型是当前研究热点之一。
Access control is the central technology of the security of database.
访问控制是实现数据库安全的核心技术。
People use it to separate the management of system from security in the access control system.
在一些最早的存取控制系统中,人们用角色来分隔安全管理和系统管理。
A key challenge in Web services security is the design of effective access control schemes.
一个关键的安全挑战就是要设计有效的访问控制机制。
Architecture and mechanism for access control are the realization of access control model in system.
访问控制框架和访问控制机制是访问控制模型在系统中的实现。
Architecture and mechanism for access control are the realization of access control model in system.
访问控制框架和访问控制机制是访问控制模型在系统中的实现。
应用推荐