An access control list is a list of permissions or sets of permissions securing a resource.
访问控制列表是权限列表或保护资源的权限集。
This is the interface used for representing one entry in an Access Control List (ACL).
该接口用来表示访问控制列表中(acl)的一个入口。
C. Modification road by implement access control list, prohibit be being visited illegally.
修改路由器的存取控制列表,禁止非法访问。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.
下面所示的访问控制列表文件允许具有admin实例的所有主体对领域VMKRB5进行全面访问。
Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL).
提供遍历访问控制列表 (ACL)中的访问控制项 (ACE)的能力。
For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.
对于此示例,请使用AccessManager访问控制列表(Access Control List,ACL)来管理ObjectGrid授权策略。
Access control list can be used to filter away dangerous packets and give some level of protection to the network.
访问控制列表能够过滤掉网络中的有害报文,给网络提供一层相对安全的保护。
A sophisticated ACL (Access Control List) is used to ensure that the appropriate user is mapped to the desired information.
复杂而精密的ACL(访问控制列表)用于确保将适合的用户映射到所需要的信息。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (AccessControl List) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.
“门户管理”还可以管理访问控制列表 (ACL),以便为门户确定角色和权限映射。
The server can impersonate the client for access control list (ACL) checking, but it cannot access system objects as the client.
服务器可以模拟客户端以进行访问控制列表(acl)检查,但是无法作为客户端访问系统对象。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
Distribution of controlled documents and the transmittal proforma to be used is defined in the attached document control list Table 1.
本文随附的文件控制清册表1,对受控文件的分发,和文件传送预编表进行了说明。
Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.
更新数据库domforint . nsf的访问控制列表(acl),以防止匿名访问以及向用户授权相应的角色。
If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.
如果存在,则必须相应地使用文件系统中的代码访问安全机制或访问控制列表,来保护包含这些文件的目录。
Such mechanisms as the end-use and end-user guarantee system, licensing system, control list and? Catch-all? Principle have all been incorporated into China? S.
目前国际通行的最终用户和最终用途保证制度、许可证制度、清单控制办法、全面控制原则等,都已为我在核、生、化、导等各个领域所广泛采用。
The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.
管理员配置分配给每个过程的访问控制列表,这样就存在定义该过程中谁能够做什么的业务控制。
If you deselect the All Users option in the Page Access dialog box, it lists everyone who has a role defined in the composite application's Access Control list.
如果在PageAccess对话框中取消选择all User选项,它会列出在复合应用程序的Access Control List中定义过角色的所有用户。
Each bindable item in the Data Sources window has a control list that is accessed by selecting the item and then clicking the drop-down arrow attached to the item.
“数据源”窗口中的每个可绑定项都有一个控件列表,该列表可通过选择项,然后单击附加到项的下拉箭头来访问。
Logically speaking, this control list will include equipment, material and technology that can be directly used in missiles, as well as missile-related dual use items.
从逻辑上讲,这一清单将包括直接用于导弹的设备、材料和技术,以及与导弹相关的双用途物项。
The us export control laws make it illegal for companies to use military agent technology on commercial product that ends up in markets that are on the us control list.
美国出口管制法规定:最终在美国管制清单内的市场里销售掉的商业产品运用军事代理技术是违法的。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
On the Basics tab of the File Protection document, accept the default options and modify the access control list to make sure that the domino/html/web2.0 directory is specified as the Path.
在FileProtection文档的Basics附签上,接受默认的选项并修改accesscontrol列表以确保将domino/html/web2.0目录指定为Path。
In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.
在无线网络中,攻击者可以修改自己无线网卡的MAC地址为合法站点的地址,从而可以绕过访问控制列表,窃取网络信息,这给无线网络安全带来很大的危害。
In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.
在无线网络中,攻击者可以修改自己无线网卡的MAC地址为合法站点的地址,从而可以绕过访问控制列表,窃取网络信息,这给无线网络安全带来很大的危害。
应用推荐