access control set 中文意思是什麼

access control set 解釋
存取控制指令
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • set : SET =safe electronic transaction 安全電子交易〈指用信用卡通過因特網支付款項的商業交易〉。n 【埃...
  1. Permissions are set using access control lists

    權限是使用訪問控制列表設置的。
  2. When you get the set of all audit rules for a mutex, the set contains the minimum number of rules currently required to express all the access control entries

    在獲取某個mutex的所有審核規則的集合時,該集合包含當前表示所有訪問控制項所需要的最低數量的規則。
  3. When you get the set of all audit rules for an event, the set contains the minimum number of rules currently required to express all the access control entries

    在獲取某個事件的所有審核規則的集合時,該集合包含當前表示所有訪問控制項所需要的最低數量的規則。
  4. Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on

    基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密碼、條目的添加、刪除、修改、設置組、設置角色和設置訪問控制等,前臺頁面使用了樹型結構,直觀的反映了目錄服務器中數據的拓撲結構。
  5. Class with the specified identity reference, access control type, property access type, property set identifier, inheritance type, and inherited object type

    使用指定的標識引用、訪問控制類型、屬性訪問類型、屬性集標識符、繼承類型和繼承對象類型來初始化
  6. Critical transaction set and task authorization indicator are introduced to allow for finer granular permission control, thus some problems of complex constrains such as history - based separation of duty can be solved effectively, and this provide a good base for active access control

    通過引入臨界事務集合和任務授權指示符,實現了細粒度的權限控制,能夠較好地解決基於歷史的職責分離之類的復雜約束問題,並為主動訪問控制奠定了基礎。
  7. A set of access control system is proposed to achieve the requirements of both electrons government affairs and securities and integrity ; these performances are realized in c + + and the system has put into use

    提出並實現一套訪問控制系統使其既能滿足現實電子政務的應用要求,又能滿足信息的機密性和完整性要求;用c + +語言實現以上的全部功能,此系統已在中船重工集團獲得使用。
  8. Of this series, i talked about how to set up access control lists acls and the impact of the size of acl entries on uptime availability as specified in a service - level agreement guarantee

    ,我討論了怎樣建立訪問控制列表( acl )以及acl入口大小對服務級別協議( sla )保證中規定的正常運行時間可用性的影響。
  9. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  10. Skynet personal firewall edition is the use of the personal computer network security procedures, according to managers to set rules to guard the security network, provide powerful access control, information filtering and other functions, help you ward off network intrusions and attacks, prevent information leakage

    天網防火墻個人版是個人電腦使用的網路安全程序,根據管理者設定的安全規則把守網路,提供強大的訪問控制、信息過濾等功能,幫你抵擋網路入侵和攻擊,防止信息泄露。
  11. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。
  12. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命令模式的持久層組件,封裝了數據庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的代碼冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問控制的安全子系統則初步實現了數據安全傳輸和權限控制;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
  13. How to set up and configure the role of role - based access control

    基於角色的訪問控制中角色的劃分
  14. Analyze the systematic structure of the product data management system and study the object representation of the product data integration model, the product data attribute and operation, the product information modeling and the theory and method of access control modeling in order to set up the object model of the product data access control and describe the data base conversion of the object model and executive method

    分析產品數據管理系統的體系結構,研究產品數據的集成模型的對象表示,產品數據屬性和操作,產品信息建模和訪問控制建模的理論和方法;建立產品數據訪問控制的對象模型,並說明對象模型的數據庫轉換和實現方法。
  15. Access control : to set, change the machine set time online

    上網控制:可設定、更改本機的上網時間設置。
  16. If this property is set to a null reference nothing in visual basic, a single access control entry that allows everyone full access aefa is added to the dacl

    如果此屬性設置為空引用(在visual basic中為nothing ) ,則會向該dacl添加一個允許所有用戶完全訪問( aefa )的訪問控制項( ace ) 。
  17. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  18. And resources holders can set the access authority for each role type based on different access control polices

    這種訪問控制模型,極大簡化了資源控制方對訪問權限管理的工作量,增強了安全策略配置的靈活性。
  19. If users log on locally to access shared resources, such as on a terminal server, set permissions by using ntfs file system permissions or access control

    例如,如果使用者只需要讀取資料夾中的資訊且他們絕不會刪除、建立或變更檔案,則將[讀取]權限指派給他們。
  20. As a part of is ( information security ), also one of the standard security services established by iso ( international standard organization ). access control is used to protect important resources, for instance, prohibits illegal user ’ s access to the confidential resources, restricts legal users ’ operation in their permitted set of operation and prevents resources from damages due to carelessness

    作為信息安全體系的一部分,同時也是國際化標準組織定義的五項標準安全服務之一,訪問控制在保護重要資源方面有相當重要的作用,包括防止非法用戶訪問機密信息,限制合法用戶的非法操作,以及由於疏忽所造成的誤操作對資源的破壞。
分享友人