• Control of access to this water is essential.

    水源控制权基本

    youdao

  • Objects can have several levels of access control.

    对象拥有几个级别访问控制

    youdao

  • The primary value of this approach is to control file system access by applications.

    这种方法主要价值在于控制应用程序文件系统访问

    youdao

  • It is a form of mandatory access control.

    强制访问控制一种形式

    youdao

  • A better solution might be to control database object access through the use of schemas.

    更好解决方案可能通过使用模式控制数据库对象访问

    youdao

  • Part 3 of this series will discuss the fine-grained access control model in more detail.

    系列第3部分详细地讨论细粒度访问控制模型

    youdao

  • Our clients take advantage of both role-based permission and fine-grained access control.

    我们客户同时利用基于角色权限细粒度访问控制

    youdao

  • The full capabilities of authentication and access control are beyond the scope of this article.

    身份验证访问控制完整功能超出本文范围

    youdao

  • They are responsible for the control of user access to the network.

    他们责任控制用户网络访问

    youdao

  • As a result, you can enforce the access control portion of user management.

    因此可以实施用户管理访问控制部分

    youdao

  • Second, the server can take care of access control.

    第二服务器能够进行访问控制

    youdao

  • A security and access control model that distinguishes between these two classes of users.

    区分上述用户安全和访问控制模型

    youdao

  • This type of control is called mandatory access control (MAC).

    这种控制类型称为强制访问控制(MAC)。

    youdao

  • The control logic makes use of COM objects (3) to access the database.

    控制逻辑利用COM对象(3)访问数据库

    youdao

  • Most of the current systems implement access control and authorization in a proprietary manner.

    目前多数系统专有的方式实现访问控制授权

    youdao

  • Now, let's look at the important elements of this control-access sequence in more detail.

    现在我们详细地一下这个访问控制序列中的重要元素

    youdao

  • However, this encryption method can not cross the application system to achieve access control of sensitive data.

    但是这种加密方式不能越过应用系统实现应用系统用户对敏感数据访问控制

    youdao

  • Secondly, we analyze the essence of the security in the access control.

    其次认真分析访问控制安全性本质

    youdao

  • Implementing an access control policy usually consists of two steps.

    实现访问控制策略通常包含两个步骤

    youdao

  • The Translator consists of two sub-components, the access control server and the file cache.

    Translator两个组件组成,即访问控制服务器文件缓存

    youdao

  • Deciding all this is part of an access-control policy.

    决定所有这些访问控制政策一部分

    youdao

  • An example of calling code in the access control hook of an action.

    actionaccess controlhook调用代码的一个例子如下。

    youdao

  • Add an access control hook on the actions of the defect record type.

    缺陷记录action增加一个access controlhook

    youdao

  • The research of access control model is a topic of information security area.

    访问控制模型信息安全领域研究重点之一。

    youdao

  • Access control model is one of the research focuses currently.

    访问控制模型当前研究热点之一

    youdao

  • Access control is the central technology of the security of database.

    访问控制实现数据库安全核心技术

    youdao

  • People use it to separate the management of system from security in the access control system.

    一些最早的存取控制系统中,人们角色分隔安全管理系统管理。

    youdao

  • A key challenge in Web services security is the design of effective access control schemes.

    一个关键安全挑战就是设计有效访问控制机制

    youdao

  • Architecture and mechanism for access control are the realization of access control model in system.

    访问控制框架访问控制机制访问控制模型系统中的实现

    youdao

  • Architecture and mechanism for access control are the realization of access control model in system.

    访问控制框架访问控制机制访问控制模型系统中的实现

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定