The article made a detailed review on the system structure and system privilege control of the spare parts management system.
文中详细讨论了备件管理系统的系统结构以及系统的权限控制。
Any operating system user can potentially access DB2; however, unless they have been granted a given DB2 authority or privilege, there is not much they can do.
任何操作系统用户都有可能访问DB2;但是,除非他们被授予给定的DB 2权限或特权,否则他们能做的事情不多。
Most of the rest of the policy merely is there to grant the container sufficient privilege to access bits of the system: network ports, devices, consoles, etc.
剩余的策略主要是授与容器充分的特权,以访问系统的各个部分:网络端口、设备和控制台等。
This effectively undermines the entire purpose of the patent system: the Patent Office is charging applicants serious money for giving it the privilege of giving away their commercial secrets.
这有效地破坏了整个专利制度的目的:专利局向申请人收费,而却给予他们泄漏商业秘密的特权。
When a database is created, SELECT privilege on the system catalog views is granted to PUBLIC (Figure 6).
在创建一个数据库时,系统编目视图上的SELECT权限便被授给PUBLIC(图6)。
Privileges, privilege groups, privilege sets and ACLs form the basis of the authorization system of IBM DB2 CM and are discussed in further detail later in the article.
权限、权限组、权限集合和ACL形成了IBMDB 2CM授权系统的基本结构,本文后面将详细讨论。
This privilege is needed to call the UNIX operating system APIs to authenticate or to collect user and group information.
需要使用该权限调用UNIX操作系统APIs来进行身份验证或收集用户和组信息。
You must hold DBADM or SYSADM authority to grant or revoke the SELECT privilege on system catalog views.
必须要有DBADM或SYSADM权限,来授予或撤消系统编目视图上的SELECT权限。
In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more.
Android系统通过这种方式实现最低权限原则(the principleofleast privilege).也就是说,每个应用在只需要完成自己的功能而不需要其他服务的时候,默认只对自己的组件有访问权限。
This database stores all the necessary information about system-critical files, including kernel extension modules or the files that require root privilege to execute.
此数据库存储了有关系统关键型文件的所有必要信息,这些文件包括内核执行模块或需要root权限才能执行的文件。
This system has satisfied with privilege management demand, possessing the function of Web resources description, automatical collection and resources tree build and so on.
该系统较好的满足了授权管理的需求,具有资源统一描述、自动收集、资源树生成等功能。
As an important component of high-level secure operating systems, the privilege control mechanism can provide an appropriate level of security assurance for the system.
特权控制机制是高安全等级操作系统中一个重要的组成部分,它能够提供系统恰当的安全保证级。
To prohibit privilege abuse, operating system must clearly know the necessary privileges needed by a program.
要限制权限滥用,操作系统必须清楚哪些是应用程序正常所需权限。
Combined with privilege management system and log system, this digital signature system ensures that the E-Government system will run safely and efficiently.
同时,数字签名系统与权限管理子系统,日志子系统相结合共同保证了该电子政务系统安全、高效地运行。
The assistant functions are the system administration, the user privilege administration, overall query and so on.
辅助功能有系统管理、用户权限管理、综合查询等。
This paper introduces a strategy in the privilege safety mechanism in power technology supervise system, and discusses the way through which the mechanism is realized by using ASP and ADO technology.
介绍电力技术监督系统的权限安全机制设计策略及用asp,A DO技术实现安全机制的方法。
This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.
论文在对自主访问控制、强制访问控制和基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择并实现了基于角色的权限管理系统。
The privilege of different users is analyzed with the clinical information system, and a suitable mechanism and a method of dynamics with system authority is designed.
分析了临床路径系统中出现的不同用户的权限问题,设计了适合系统的权限管理机制。
The goal of the thesis is to develop a user privilege management system as a subsystem of MIS of special items to provide user management and access control functions.
论文的研究目标是为特种物品MIS开发一个用户权限管理系统,作为子系统为特种物品MIS提供用户管理和权限控制的功能。
This paper studies converting system from three aspects, namely the nature and realization of convertible privilege, conversion price and conversion periods.
本文从转换权的性质及实现、转换价格和转换期间三方面进行研究。
In his recent book, "Exorbitant privilege", Mr Eichengreen argues that a reserve-currency system will emerge in which the dollar, the euro and the yuan share the privileges and the responsibilities.
在Eichengreen先生最近的一本新书《过分特权》里,他提出将会产生新的储备货币系统,其中美元,欧元,人民币三足鼎立,平分特权和责任。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
In the designing process, the whole system will be divided into three modules, include user information management, article information managements, and privilege management.
在具体的设计过程中将整个系统分成了三个模块,包括用户信息管理、文章信息管理、权限管理。
So far, the privilege management function of the engineering database system CO-S_DBS is realized, by combining this model.
并结合此模型实现了CO-S_DBS工程数据库系统的权限管理功能。
In this dissertation the integrated and privilege-role extended UNIX operating system security model, which is based on the BLP model, is discussed.
在对BLP模型进行分析的基础上,提出了以BLP模型为基础的完整性和特权角色扩展的UNIX操作系统安全模型。
The theory was made up of such basic concepts as action system, action structure, action privilege and social optimum.
科尔曼的理性选择理论是由包括行动系统、行动结构、行动权利以及社会最优等四组基本概念构成的。
Besides the blueprint establishment, the paper had also considered the system security problem, it established the effective user authentication and privilege management function module.
系统除了实现了图纸库的建立和管理功能外,考虑了系统安全性能,建立了有效的用户权限管理功能模块。
The privilege also has a long history in ancient China, which is recognized as the"accept and hide"system.
这一内容在我国古代也有着悠久的历史渊源---容隐制度。
The privilege also has a long history in ancient China, which is recognized as the"accept and hide"system.
这一内容在我国古代也有着悠久的历史渊源---容隐制度。
应用推荐