• 实现访问控制策略通常包含两个步骤

    Implementing an access control policy usually consists of two steps.

    youdao

  • 配置简单访问控制策略分为两个步骤

    You can divide configuring a simple access control policy into two steps.

    youdao

  • 编写访问控制策略

    Writing the access control policy.

    youdao

  • 节将展示如何配置IF实现访问控制策略

    This section shows you how to configure IF to implement an access control policy.

    youdao

  • 拦截器使用应用程序访问控制策略做出授权决定

    Interceptors use your application's access control policy to make authorization decisions.

    youdao

  • 发明公开了一种访问控制策略生成方法装置

    The invention discloses method and device for generating an access controlling policy.

    youdao

  • 访问控制策略保证数据库访问身份合法性。

    Access control security strategy is to preserve the legality of the database users.

    youdao

  • 系统采用基于角色访问控制策略,进一步保证系统的安全

    The system adopts the Role Based Access Control to ensure the security of the system.

    youdao

  • XACML一个灵活标准并且允许策略创建者构建复杂访问控制策略

    XACML is a flexible standard and allows policy authors to build complex access control policies.

    youdao

  • 在线策略包含一个多个加密密以及访问控制规则

    An online policy holds one or more encryption keys and rules for access control.

    youdao

  • 本文提出种基于RBAC策略的多域网络访问控制模型

    In this paper, we propose a multi-domain RBAC access control model.

    youdao

  • 本文提出种基于RBAC策略的多域网络访问控制模型

    In this paper, we propose a multi-domain RBAC access control model.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定