• Assigns access rights to the queue based on the contents of an access control entry.

    根据存取控制项目内容指派伫列存取权限

    youdao

  • An access control list is a list of permissions or sets of permissions securing a resource.

    访问控制列表权限列表保护资源权限

    youdao

  • This is the interface used for representing one entry in an Access Control List (ACL).

    接口用来表示访问控制列表中(acl)的一个入口

    youdao

  • One method to satisfy the access authority on file access is to implement an access control list (ACL).

    文件访问进行访问授权方法实现访问控制列表 (ACL)。

    youdao

  • The implement of the model depends on a message processing security model and an access control model.

    模型依赖于消息安全处理模型访问控制模型。

    youdao

  • Represents a combination of a user's identity, an access mask, and an access control type (allow or deny).

    表示用户标识访问访问控制类型(允许拒绝)组合

    youdao

  • Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL).

    提供访问控制列表 (ACL)中的访问控制ACE能力

    youdao

  • An access rule represents a combination of a user's identity, an access mask, and an access control type (allow or deny).

    访问规则表示用户标识、访问访问控制类型(允许拒绝)组合

    youdao

  • An access control mechanism is given for the protection of the resource module in the object oriented programming systems.

    给出了用于保护面向对象编程系统资源模块访问控制机制

    youdao

  • This paper provides an access control mechanism within collaborative CAD, based on a technique we call role-based viewing.

    提出协同CAD信息存取机制,这种机制是以基于角色的视图技术为基础的。

    youdao

  • An administrator can also assign an access control list to each work node for additional security control at the work node level.

    管理员可以每个工作节点分配访问控制列表进一步工作节点级别上进行安全控制。

    youdao

  • You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.

    详细了解配置Acegi 的方法,从而LDAP目录交互实现访问控制策略

    youdao

  • Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.

    AccessManager创建一些测试对象用户受保护资源然后添加访问控制列表策略

    youdao

  • This model can resolve various security problem of current applications, and can be extended to an access control model for the different domains.

    模型可以很好地解决现在一些系统存在安全问题并且可以扩展成多域之间的安全互访问模型。

    youdao

  • If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.

    如果存在必须相应地使用文件系统中的代码访问安全机制访问控制列表来保护包含这些文件目录

    youdao

  • For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.

    现在只需了解拦截可以拦截用户在用户访问bean之前实现访问控制策略

    youdao

  • For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    youdao

  • Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML.

    针对网格环境下资源访问控制特点提出一个基于使用控制模型UCON结合XACMLSAML访问控制模型

    youdao

  • The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.

    管理员配置分配每个过程访问控制列表这样存在定义过程能够什么的业务控制。

    youdao

  • To provide a direct and precise description for workflow access control, an access control model for workflow systems was developed based on graph and graph transformation.

    为了直观准确地描述工作流访问控制,提出了基于工作流访问控制模型

    youdao

  • The next article in this series will get you started with some more advanced uses of Acegi, beginning with writing an access control policy and storing it in a directory service.

    系列下一文章开始介绍 Acegi一些较为高级应用首先编写访问控制协议将其存储目录服务中。

    youdao

  • In this second article, I begin to discuss the more advanced USES of Acegi, starting with writing an access control policy and storing it in ApacheDS, an open source LDAP directory server.

    第二篇文章中,讨论Acegi更加高级应用首先我将编写访问控制策略将其存储ApacheDS中,ApacheDS是一个开源LDAP目录服务器。

    youdao

  • Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.

    Acegi将减轻代码编写的工作,因此篇文章展示如何用户用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略

    youdao

  • In this paper, we present an access control scheme that can resolve these issues, and propose a dynamic context-aware access control model (DCAAC) which extends RBAC with context constraints.

    本文提出了一个上下文感知访问控制模型(DCAAC),D CAAC扩展了RBAC模型,增加了上下文约束

    youdao

  • Then, an access control model based on organization modeling for enterprise information systems is proposed, the elements are defined and the mechanism for realizing control access is advanced.

    此基础给出个基于组织建模企业级信息系统访问控制模型定义一组模型要素给出了实现访问控制机理

    youdao

  • You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.

    现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义用户角色控制功能访问应用程序

    youdao

  • The trusted device network approach provides an organization with a higher level of control over critical system access.

    信任硬件网络策略提供了一种可以更高效控制临界系统接入组织结构

    youdao

  • Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.

    与表一样昵称也有对等的一权限用于控制用户联邦系统昵称对象访问

    youdao

  • A lock associates the resource with an application, called the lock owner, to control how other applications can access the same resource.

    资源应用程序(叫做拥有者)相关联,控制其他应用程序对同一资源的访问

    youdao

  • A lock associates the resource with an application, called the lock owner, to control how other applications can access the same resource.

    资源应用程序(叫做拥有者)相关联,控制其他应用程序对同一资源的访问

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定