access rights 中文意思是什麼

access rights 解釋
訪問權限
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當網路配置后,授權用戶就可以在任一internet終端實現對監控主機的訪問和控制,以進行調度優化,遠程診斷與維護。目前,這套工業遠程信息監控系統已在省計算機重點實驗室進行了運行測試,系統工作正常,達到了預期要求。
  2. Shareowners have the rights to interpellate the independence, equality and the inherent characteristics : the performance of its independence from the shareholders in interpellate is different from those relating to the rights of stockowners such as the access rights and the propose rights

    最後,本文對股東質詢權的法律救濟進行了討論,認為股東質詢權的法律救濟方式主要有如下幾種:強制咨詢程序、撤銷股東大會瑕疵決議之訴、損害賠償之訴。
  3. Gets or sets a set of common access rights that map to both standard and object - specific access rights for reading, writing, and executing

    獲取或設置一組公共訪問權限,這些權限映射到標準和對象特定的訪問權限以用於讀取、寫入和執行。
  4. A term indicating conformance to standards or criteria ; for example, “ valid data ” is data that has been checked for errors ( and corrected if necessary ) and a “ valid reference ” is a reference that correctly ? identifies ? a storage location in an area to which a program has access rights

    指出與標準或準則的一致性而用的術語,例如, 「有效數據」指經過差錯校驗的數據(如果需要,已經過糾正) ,而「有效引用」是一種引用,它正確地標識出程序可以訪問的區域內的一個存儲單元。
  5. Applications that define private securable objects can also use the generic access rights

    定義私有安全對象的應用程序還可以使用這些一般訪問權限。
  6. Securable objects use the four high - order bits of the windows 2000 and windows nt access mask format to specify the generic access rights

    安全對象使用windows 2000和windows nt訪問掩碼格式的四個高序位來指定一般訪問權限。
  7. Each object type can map generic access rights to a set of standard common to most types of securable objects and object - specific rights

    每一對象類型都可將一般訪問權限映射到一組標準(大多數安全對象所共有的)和對象特定的權限。
  8. Access rights defined for a page will hold good for those group of linear addresses forming a page

    為一個頁定義的訪問權限中保存了構成該頁的整組線性地址的權限
  9. A recent photograph of the person infringing access rights ( only if hisher whereabouts are not known )

    侵犯探視權的人的近照(只需于該人下落不明的情況下提供) ;
  10. The process repository holds process diagrams and all process related information ( resources metadata, access rights, workflow actions )

    流程知識庫用以保存流程圖表和全部與流程相關的信息(資源數據、訪問權限、工作流) 。
  11. This constructor allows you to specify access rights for specific key containers identified by name ; use an asterisk to represent all the key containers

    使用此構造函數能為按名稱標識的特定密鑰容器指定訪問權限;使用星號( 「 * 」 )表示所有的密鑰容器。
  12. Uses the windows 2000 and windows nt access format to specify a set of common access rights that message queuing maps to both standard and object - specific access rights for reading, writing, and executing

    使用windows 2000和windows nt訪問格式指定一組公共訪問權限,消息隊列將這些權限映射為標準的和對象特定的讀取、寫入和執行訪問權限。
  13. A uri string to which access rights are granted

    向其授予訪問權限的uri字元串。
  14. Specifies access rights for specific key containers

    為特定密鑰容器指定訪問權限。
  15. Property to verify the sender s access rights

    屬性一起用來驗證發送方的訪問權限。
  16. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出問題的發生可能
  17. The system checks the access control entries in sequence until it finds one or more that allow all the requested access rights or until any of the requested access rights are denied

    系統按順序檢查訪問控制項,直到找到一個或多個允許所有請求的訪問權限的項,或者直到所有請求的訪問權限均被拒絕。
  18. It will have all the good features of transparent applications, and it allows individuals to administer their own bindings, so you can push the access rights of the bindings down to the individual names

    它具有透明應用程序的所有好的特性,並且允許單獨某個人來管理屬于自己的綁定內容,因此可以推動訪問權限與單個名稱的綁定。 」
  19. Each type of securable object maps these bits to a set of its standard and object - specific access rights

    每一可保護對象類型都將這四個高序位映射到一組其標準和對象特定的訪問權限。
  20. However, if the users have no access rights, but all access rights are granted to the groups, then set this property to true

    然而,如果用戶沒有訪問權限,則將所有的訪問權限授予組,然後將此屬性設置為true 。
分享友人