The older person is much more amenable if he or she "can control who has access to the information and what information they have access to," she said.
如果老人们能够控制谁有权得到信息并且哪些信息是别人有权得到的,他们将更愿意接受这些设备。
Therefore, to test them, you need to get direct access to information about how the control works from the control itself.
为了测试这些接口,您需要直接从控件本身获取控件如何工作的信息。
If we were to be able to effectively control access to the information for each persona, having robust and flexible session and user management would make our implementation easier.
如果我们能够有效地控制对每个人的信息的访问,那么具有健壮且灵活的会话管理和用户管理会使实现更容易。
If I control my personal information, I want to ensure that I am the only one who can access that information. If someone maliciously accesses it, I want to prevent them from reading it.
如果我保护了我的个人信息,就应该确保我是唯一能得到那个信息的人,如果有人故意闯入,我就应该阻止他。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Information gathered by social network applications needs to be protected by policies which control access to information.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
The changes Facebook plans to introduce will allow users to control the types of personal information that applications can access.
Facebook计划推出的这些改变让用户能够管理个人信息类别,而这些信息程序制作者可以使用。
This allows Action to access the information to control flow.
这样就使Action可访问用于控制流程的信息。
He said "no one has been able to take control of the iPhone to gain access to personal information using this exploit."
他说,到目前为止还没有人能利用这一漏洞控制iPhone,获知用户的个人信息。
New! Botnet Detection -prevents others from taking control of your PC to access your private information or use it to host an attack.
新!僵尸网络检测,阻止他人控制你的电脑来存取您的私人信息或使用它来举办一次攻击。
Data management applications control, protect, and facilitate access to data in order to provide timely information to consumers.
为了向客户提供适时信息,数据管理应用程序控制、保护并促进了数据的访问。
SCADA provides local and remote control capability for immediate access to real-time network information, as well as easy connectivity to other systems in the electrical network.
SCADA系统为立即获得实时的网络信息,以及容易连接到其他系统的电气网络,提供了本地和远程控制能力。
It is very important to control the access to base data of the corporation in construct management information system.
在建筑管理信息系统中,对基础数据的访问权限控制是一个重要的内容。
Using this algorithm, an organization that hosts services for other businesses to use can control the information that is used to actually access the hosted service.
使用上述这个算法,一个为其他企业提供主机服务的机构可以控制实际访问该服务的信息。
We establish sufficient conditions under which it is revenue-maximizing for the seller to grant each private type of the buyer full access to all additional private information under her control.
研究的一个结果是,我们建立了让每个类型的买方都充分了解信息的披露政策能给卖方带来最大利润的充分条件。
A sophisticated ACL (Access Control List) is used to ensure that the appropriate user is mapped to the desired information.
复杂而精密的ACL(访问控制列表)用于确保将适合的用户映射到所需要的信息。
The other technology LDAP can provide a secure model to control access requirement according to identity information.
LDAP提供了一个访问控制的安全模型,根据身份信息对提出的访问请求进行控制。
School youth in the general mainstream culture among the local community, in schools should have access to the knowledge, information and skills that can help them to increase control over operations.
校内青少年一般处于当地社会主流文化当中,在学校获得了应有的知识、信息和技能,可以帮助他们增加行动的控制能力。
The management of online information resource is aimed to plan, organize, allocate, coordinate and control online information resource so that users can easily access to them.
网络信息资源管理是对网上信息资源实施计划、组织、分配、协调和控制,以确保信息资源有效利用的一种管理活动。
Also provides access to a session-wide cache you can use to store information, along with the means to control how the session is managed.
提供对所有会话的应用程序范围的方法和事件的访问。还提供对可用于存储信息的应用程序范围的缓存的访问。
Usually a hacker using different server hardware and software vulnerabilities to get access to the server and control over sensitive information.
通常黑客利用各种服务器软硬件漏洞,获得服务器的控制权与敏感信息。
To protect information from the ignorant, and the vile. an elaborate scheme of permissions is used. Permissions, also known as access control, are what determine who can do what to what.
为了避免信息受到无知者和恶意者的干扰,使用一种精心设计的“许可”,也叫“存取控制”,决定谁可以对什么做什么。
Finally, the paper will apply design program of rights management based on UOBAC model to logging information service platform to achieve access control of a logging company central database.
最后,论文将基于UO BAC模型设计的权限管理方案应用于录井信息服务平台中,实现了录井公司中心数据库的访问控制。
Records of the Company are under the control of assigned information officers who are responsible to ensure the transfer of or access to information is legitimate and complies with the Ordinance.
本公司的记录由指定的资料专责人员控制,他们负责确保资料的转移或取用是合法并符合条例规定。
It is easy to control, and easy to explant. Finally, the author uses part of the research result in a project-management Information System for examination to realize the security access control.
最后,在一个以linux为网络服务器,MySQL为网络数据库管理系统的平台上,利用前面研究的部分技术实现对考务管理信息系统的安全控制。
Remote control function is the main access to other machines of information, access to each other's process, lock and unlock the keyboard and mouse locking and unlocking other.
远程控制功能主要是获取对方机器信息,获取对方进程,锁定和解锁键盘,锁定和解锁鼠标等。
Remote control function is the main access to other machines of information, access to each other's process, lock and unlock the keyboard and mouse locking and unlocking other.
远程控制功能主要是获取对方机器信息,获取对方进程,锁定和解锁键盘,锁定和解锁鼠标等。
应用推荐