訪問控制權限 的英文怎麼說

中文拼音 [fǎngwènkòngzhìquánxiàn]
訪問控制權限 英文
access control right
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  • 權限 : limits of authority [powers]; power; authority; within the power or right of; jurisdiction; compe...
  1. The users are managed based on roles and grades, the types of users are : anonym, student, teacher and administrator, implement secure management by setting access control privilege specially

    用戶管理採用基於角色的分級管理模式。將用戶主要分為匿名用戶、學生、教師和管理員四種類型,通過對其分別設置訪問控制權限來實現安全和管理。
  2. One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority

    摘要基於角色( rbac )技術的一個重要概念就是角色,通過在用戶和之間增加一個角色層,使得更為簡單且靈活有效。
  3. Allows control of code access security permissions

    允許代碼安全
  4. 6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data

    6 )採用嚴格的方式與管理機。 fsca系統充分保證了用戶數據的合法性與有效性。
  5. It checks the access control list of the. aspx or. asmx handler file to determine whether a user should have access to the file

    它檢查. aspx或. asmx處理程序文件的列表( acl )以確定用戶是否應該具有對文件的
  6. From document level actions, privileges with fine granularity such as create, read, update, delete, print, annotation modify, to resource manager collection access control, ibm db2 content manager ensures proper access and use

    從文檔級動作,創建、讀取、更新、刪除、列印的細粒度和注釋修改,到resource manager集合, ibm db2 content manager都可以保證正確實現和使用。
  7. Traditional access control model hardly consider the issue of subjects ' trust worthiness and privilege partition

    傳統模型在授過程中沒有考慮主體的信任度和集合劃分等題。
  8. Permissions are set using access control lists

    是使用列表設置的。
  9. Class with the specified identity reference, access control type, and extended right identifier

    使用指定的標識引用、類型和擴展標識符來初始化
  10. This thesis analyzes the features of organization management and privilege management in wfms. the author introduces the role and task based access control ( r & tbac ) model to wfms. the author also designs a tree - structure organization structure which

    在分析工作流管理系統中的組織管理和管理的特點之後,本文引入基於角色和任務的( r & tbac )模型,並設計了樹型組織結構圖,能更好的組織角色、構造角色層次,最後使用mvc模式進行設計並利用struts等框架進行具體實現。
  11. Class with the specified identity reference, access control type, extended right identifier, active directory security inheritance, and inherited object type

    使用指定的標識引用、類型、擴展標識符、 active directory安全繼承和繼承對象類型來初始化
  12. When computing effective permissions entitlements for bob cached in explicitentitlementscache, the portal access control component leverages existing cache values from the childresourcescache and rolemappingcache

    :在計算bob的有效或(利) (在explicitentitlementscache中緩存)時,門戶組件利用childresourcescache和rolemappingcache中現有的緩存值。
  13. Critical transaction set and task authorization indicator are introduced to allow for finer granular permission control, thus some problems of complex constrains such as history - based separation of duty can be solved effectively, and this provide a good base for active access control

    通過引入臨界事務集合和任務授指示符,實現了細粒度的,能夠較好地解決基於歷史的職責分離之類的復雜約束題,並為主動奠定了基礎。
  14. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出題的發生可能
  15. The system checks the access control entries in sequence until it finds one or more that allow all the requested access rights or until any of the requested access rights are denied

    系統按順序檢查項,直到找到一個或多個允許所有請求的的項,或者直到所有請求的均被拒絕。
  16. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,定了行之有效的規章度。
  17. In access control apopular form of knowledge test for access control. a password is a string of alphanumeric data or a phrase that must be entered int o a system to gain access to a physical area or a resource

    存取中一種測試的常見方式,口令是由字母和數字組成的字元串或短語,它們必須輸入系統以獲得某一實際區域或資源的使用
  18. Support a large numbers of users ? since wireless carriers and portals support millions of subscribers, the wireless platform must provide facilities to centrally manage / provision these users, their security and access control privileges, and their ability to personalize services

    支持大量用戶? ?因為無線運營公司和門戶支持上百萬的用戶,所以無線平臺必須提供工具來集中管理配置這些用戶、用戶安全和訪問控制權限,以及用戶個性化服務的能力。
  19. In addition to sql server service startup accounts, access control permissions may have to be granted to built - in accounts or other sql server service accounts

    除sql server服務啟動帳戶外,可能還必須向內置帳戶或其他sql server服務帳戶授予訪問控制權限
  20. Second, in according to the application security needs, the set of discretionary access permissions has been extended to twelve permissions, such as create / delete / getattr / setattr. these additional permissions have been added and implementation defined for different objects

    二、針對不同類型的客體,根據實際需要,將訪問控制權限由原來的讀、寫、執行細化到創建、刪除、讀取屬性和修改屬性等12種。
分享友人