access validation 中文意思是什麼

access validation 解釋
合法存取
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • validation : (有效性)驗證
  1. Provides a single point of control, access, and validation of web service requests

    提供web服務請求的單點控制、訪問和驗證。
  2. Upon its full completion, a generic mechanism will have been established for enabling a secure and user - friendly identity validation and access authorization for web - based cross - domain applications ; and

    當該計劃完成後,我們將擁有一個既安全又易用的通用機制,以方便在使用網上的跨領域應用系統時作為身份檢查和使用權核實之用;及
  3. A departmental portal programme has been implemented at almost all bureaux and departments. upon its full completion, a generic mechanism will have been established for enabling a secure and user - friendly identity validation and access authorization for web - based cross - domain applications ; and

    當該計劃完成後,我們將擁有一個既安全又易用的通用機制,以方便在使用網上的跨領域應用系統時作為身份檢查和使用權核實之用及
  4. Due to the convenience access of mobile users, identity validation of the authorized users is the key thesis in the research of the wmsn

    然而隨著移動用戶的方便接入,對于使用網路資源的用戶的身份合法性驗證也就成了無線自組織網路研究中的一個關鍵問題。
  5. Guidelines the validation performed by the accessibility validation tool treats the wcag priority 1 guidelines as a subset of the access board section 508 guidelines

    由可訪問性驗證工具執行的驗證將wcag優先級1準則視為access board第508條準則的子集。
  6. Within this validation method i can check any of the entity ' s property values ( and even obtain read - only access to its associated objects ), and raise an exception as needed if the values are incorrect

    在驗證方法中可以檢查實體的屬性值(甚至只讀訪問其關聯的對象) ,如果值不合法的話將拋出異常。
  7. If you run validation against the access board section 508 guidelines, the items that fail against the wcag priority 1 subset appear in the task list as wcag 1. 1 errors or warnings

    如果對access board第508條準則運行驗證,則未通過wcag優先級1子集驗證的項將作為wcag 1 . 1錯誤或警告出現在任務列表中。
  8. Access policies specified by cschema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against cschema policies

    寫一個cschema策略類似於為xml文檔寫一個普通的schema ,區別是等碰到一個對應于機密數據的類型,這個類型應被改成一個保護類型。
  9. These released documents are then ready to be accessed by, for instance, xml query engines. by incorporating this validation procedure, other xml processing technologies can use cschema as the access control module

    一些xml處理語言,象cduce或者java ,也可把原始文檔轉換成可訪問的文檔,但是它們不能讓策略書寫員專注于機密數據,所以用它們來寫策略並不方便。
  10. This will typically be used in an access validation scenario

    這通常被用於一個訪問驗證場景。
分享友人