Safety deposit boxes are storage space for valuable items kept in an access-controlled room under tight security.
安全保险箱是在受严格安全控制的房间里保存贵重物品的储物空间。
A sheet is a collection of CARDS and provides a named, access-controlled container for application and component development.
表格是卡的集合,为应用程序和组件开发提供具有访问权限控制的已命名容器。
Some scholars argue that the concentration of water within the urban core of these sites provided a centralized source of political authority for Maya elites based largely on controlled water access.
一些学者认为,集中在这些地点的城市核心区的水资源为玛雅精英提供了一个集中的政治权力来源,而这些权力主要是基于对水资源的控制。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
This will typically involve tightly controlled access for creation of editable versions of the model, with strong management roles involved at every stage of model use and development.
创建模型的可编辑版本时,一般会进行严格的访问控制,并在模型使用和开发的每一个阶段都进行严格的管理。
Although the DB2 optimizer is helpful for selecting the best access path, the result depends on the input data, which is often not accessed or controlled by the optimizer.
尽管DB 2优化器对选择最佳访问路径有所帮助,但结果还是依赖于输入数据,优化器无法访问或控制这些数据。
The type of access that is not directly from the application itself presents problems that must be controlled.
如果访问类型并不是直接来自于应用程序本身,那么就会产生问题,必须对这类问题进行控制。
Access to the view can be controlled using GRANT statements, so that not every user could view this data.
使用grant语句可以控制对视图的访问,以免所有用户都能查看数据。
Resource access can also be controlled by group membership, making it easier to work with rights for large Numbers of users without having to touch each individual account.
都可以以组成员的方式来控制资源的访问权限,这样在用户数目较大时可以不必为每一个帐号设置权限。
The disadvantage is that if the federation is corrupted, few safeguards prevent an unauthorized user from gaining access to controlled information.
缺点在于,如果联合被破坏,很少有防护措施来防止未经授权的用户获得对受控信息的访问。
AOL controlled the services, taxed companies to access users and decided what was good or bad.
AOL控制了可接入用户的服务和税务公司,并且好与坏都是由他们决定的。
First of all, at the DB2 subsystem level, parallel access is controlled on installation panel DSNTIP4.
首先,在db2子系统级,并行访问是在安装面板DSNTIP4上控制的。
You are allowed controlled access to the host system's hard drive in the event you need to offload pertinent data from an otherwise "dead" machine.
当需要从一台系统已经 “死亡” 的机器上导出资料时,就可以使用它来受控地访问主机系统的硬盘。
Developers could connect through an SSL tunnel, with their access controlled by OAM profiles.
开发人员可以通过SSL隧道进行连接,通过oam概要对其访问权限进行控制。
Balanced access to controlled medicines is needed to maximize availability for safe and rational use to treat medical conditions while minimizing availability for abuse and dependence.
管控药物的可及性必须达到平衡,以便最大程度地扩大在安全与合理用于治疗病症时的可得性,并同时尽量减少造成滥用和依赖的可得性。
Access to Webmin modules can be controlled for each user.
可以控制每个用户对Webmin模块的访问。
DOORS Web Access provides organizations using the DOORS solution with an alternative way to work dynamically with requirements managed and controlled in a DOORS database.
DOORSWebAccess向公司机构提供了使用DOORS方案,来以动态的方式管理需求,并控制DOORS中数据的方法。
Document access is controlled by one or more Readers fields that are saved as part of a document when it is created or modified.
文档访问由一个或多个Readers字段控制,在创建和修改文档时,这些Readers字段是作为文档的一部分保存的。
The hypervisor provides controlled and filtered access to the PS3's hardware.
hypervisor提供了对PS 3硬件的受约束和经过过滤的访问。
For the simplest cases when access needs to be controlled, the creator of the mashup application can identify users or groups of users that are permitted to utilize the mashup applications.
在最简单的情况下,当需要控制访问时,mashup应用程序的创建者可以确定允许使用mashup应用程序的用户或组。
In addition to securing access to the mashup application itself, specific data sources or services used by the mashup application can have controlled access.
除了保障对mashup应用程序本身的安全访问外,还可以控制对mashup应用程序使用的特定数据源或服务的访问。
Rational ClearCase is a comprehensive solution that provides integration with design, development, build, test, and deployment tools for controlled access to software assets across the full lifecycle.
RationalClearCase是为跨整个生命周期的软件资产的受控访问提供设计、开发、构建、测试,及部署工具的集成的全面的解决方案。
Directory access is controlled by deploying GBeans that specify a security deployment plan on geronimo. Your application extends this deployment plan in the geronimo-web.xml.
通过部署GBeans而控制目录访问,GBeans指定Geronimo上的安全部署计划。
This is possible if the database environment has a large number of users and access has to be controlled to the database instance.
如果数据库环境中有很多用户,而且对数据库实例的访问必须进行控制,这就可能出现此种情况。
The DB2 stored procedures method provides for a well managed and controlled environment that can be used for access to the data — this is a must in the mainframe world.
使用DB 2存储过程的方法可以提供一种良好管理的、可控制的可用于数据访问的环境——这在大型主机领域中是必需的。
The security token (LTPA) created during the login is passed with data requests to back-end systems to enable them to perform authorization in providing controlled access to the data.
登录期间创建的安全标志(LTPA)随数据请求传递到后端系统,使后端系统可以执行授权,从而提供对数据的有控制的访问。
Similarly, access to fee-based services can also be controlled based on roles to ensure proper use of services.
类似地,还可以根据角色控制对收费服务的访问,以确保对服务的适当使用。
The central repository allows controlled access to the materials for all team members, and it presents a consistent view of the project to everyone.
集中存储库允许所有团队成员受控地访问资源,并且它给每个人呈现的项目都是一致的。
Outbound Requests: Similar to the previous entry; how can internal users get access to outside services in a controlled environment?
出站请求:与前一个条目类似;内部用户怎样访问受控环境中的外部服务?
Outbound Requests: Similar to the previous entry; how can internal users get access to outside services in a controlled environment?
出站请求:与前一个条目类似;内部用户怎样访问受控环境中的外部服务?
应用推荐