文件訪問控制 的英文怎麼說

中文拼音 [wénjiànfǎngwènkòngzhì]
文件訪問控制 英文
file access control
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. Tag and file access protocol in an html page are not supported

    >標記和協議的託管項。
  2. What is the default access control list file for the resource management and control ( rmc ) subsystem

    rmc的默認列表是哪個?在哪個目錄里
  3. Unlike file systems, db2 content manager uses a powerful relational database to provide indexed search, security, and granular access control at the individual content item level

    系統不同, db2 content manager使用強大的關系數據庫在單獨內容條目的層次上提供索引檢索、安全性和小粒度的
  4. It checks the access control list of the. aspx or. asmx handler file to determine whether a user should have access to the file

    它檢查. aspx或. asmx處理程序列表( acl )以確定用戶是否應該具有對權限。
  5. Is handled by the access control lists for the file resource in the underlying file system

    的身份驗證由基礎系統中的資源的列表處理。
  6. In this thesis, after analyzing the existed access control technology, we bring forward a rbac security access control and manage model based on ldap and design the security access control for the component datatrans

    在分析了現有的模型的基礎上,提出了基於ldap的rbac安全和安全管理的模型,並對分散式數據傳輸組datatrans進行安全性的擴充設計。
  7. This dissertation mainly introduces the key technology and innovative research of ws - dfs, such as web - based architecture, flexible component model, distributed local file storage unit, parallel access control and high efficiently organize and index for huge amount data

    主要論述基於web服務的分散式服務系統的關鍵技術及創新研究,包括體系結構、靈活的組模型、全分佈的本地存儲單元、數據並發和海量數據高效的組織和檢索等六個方面的研究成果。
  8. During designing and implementing system, the following problems are also solved, controlling sharing access, creating performance log file, maintaining performance information

    另外,在系統的設計、實現過程中還解決了性能數據的維護方式和共享,以及性能日誌的生成、性能分析的輔助處理等多項題。
  9. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要權限遞增假設下,實現了用戶對的多種權限,並大大減小了溢出題的發生可能
  10. Software system comprises some main subsystems such as the tss embedded os, host interface specification, file access control module, explicit authorization table management and audit system

    軟體系統包括tss的嵌入式操作系統、介面協議、文件訪問控制模塊、顯式授權程序、靜態授權表的管理,以及審計系統等重要的子系統。
  11. Object that encapsulates the access control rules for the current file

    對象,該對象封裝當前規則。
  12. Object that encapsulates the access control rules for the file described by the

    參數所描述的規則。
  13. Then the article introduces the design and realization of user level monitor module and kernel level monitor module detailedly, including how to realize the system clipboard monitor, the file motion control, file print job interdiction, and the directory share monitor in system ’ s user level, how to realize the process accessing filter, the process privilege control, the file encryption and decryption in system ’ s kernel level

    詳細給出了用戶層監模塊和內核層監模塊的設計和實現,包括如何在操作系統用戶層實現系統剪貼板監移動、共享目錄監列印阻斷等,如何在內核層實現進程過濾、用戶進程權限透明加解密功能。
  14. Method to retrieve the access control list entries for a file

    方法檢索列表( acl )項。
  15. Then, the application framework found on warbac model, referring to the access control framework of x. 812 | iso 10181, is given, and its designing technology is probed into particularly. mainly including the application system framework based upon warbac model, the design concerning tactic, performance function, decision - making function, communication mode and management of access control of warbac and the service based on ldap, etc. at the end of the paper, a realized file management system - ujsfwm, originating from the application framework of warbac model, is illustrated the function of the ujsfwm system and the realization of the concerning technology are explained at length in the paper

    接下來給出了參照x . 812 | iso10181架構設計的基於warbac模型的應用框架,並對其設計技術進行了詳細的探討,主要內容包括:基於warbac模型的應用框架體系結構, warbac策略設計、執行功能和決策功能及其相互間通信方式設計、 warbac管理功能設計、基於目錄管理的ldap服務等。最後介紹了根據基於warbac模型的應用框架進行設計實現的資源管理系統? ? ujsfwm ,中對ujsfwm系統的功能及其涉及到的相關技術的實現做了詳細介紹。
  16. The grid file system directory services specification describes the management of a namespace of federated and virtualized data from file system resources, access control mechanisms, and meta - data management

    Grid file system directory services規范描述的是對于系統資源數據進行聯邦化和虛擬化后的命名空間管理,,以及元數據的管理。
  17. This paper enhances the linux operating system security mainly by finest granularity discretionary access control ( dac ), mandatory access control ( mac ) and least privilege management. finest granularity dac allows that the owner of an object can choose to grant access permission to any other user

    本論主要在文件訪問控制和特權管理這兩方面對linux的安全性進行增強,即實現了細粒度的自主、強、以及最小特權管理。
  18. Gets or sets the file or directory in which access control information can be viewed

    獲取或設置可在其中查看信息的或目錄。
  19. Gets or sets the file or directory in which access control information can be changed

    獲取或設置可在其中更改信息的或目錄。
  20. The absolute path of the file or directory in which access control information can be viewed

    可在其中查看信息的或目錄的絕對路徑。
分享友人