權限控制 的英文怎麼說

中文拼音 [quánxiànkòngzhì]
權限控制 英文
authority control
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 權限 : limits of authority [powers]; power; authority; within the power or right of; jurisdiction; compe...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲方式、信息訪問權限控制、用戶身份驗證、密碼和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸方案的選擇和實施。
  2. Involuntarily, questions of these engineering datas " management appear, datas " persistance only depending relational model and rdbms is greatly insufficient, so this paper carefully studies object - relational mapping based on rdbms based on the analyse of home & overseas actualities, correlative theories and realizing methods of object - relational mapping, we find opl based on rdbms is the most suitable for object relatinoal mapping of clera. based on the engineering application analyse of opl in clera, function requirements, database modes, interface criterions and functions, running modes of opl have being detailedly described. with the framework of microsoft dna, a kind of realizing method of opl based on com / dcom / activex component technology has being brought forward, and this paper describes realizing keys from base tables " definition, object id and class hx class and inheritance of class, object storage, parallel control and affair, object query, object nesting, relations between objects, support of complex data types, right control of object and buffer management of object

    本文在分析對象?關系映射技術的國內外現狀、相關理論及實現方法的基礎上,研究發現基於rdbms的opl是目前最適合clera的對象?關系映射方法;在clera的opl應用分析的基礎上,詳細描述了opl的功能要求、數據庫模式、介面規范與功能、運行方式等內容;結合microsoftdna開發框架,提出了一種基於com dcom activex組件技術的opl實現思路,並從基本表定義、對象標識與類標識、類與類繼承、對象存儲、並發與事務、對象查詢、對象嵌套、對象間聯系、復雜數據類型的支持、對象級權限控制及對象緩沖管理等幾方面概述了實現要點。
  3. M ( 4 ) do a deep research on the privilege management of the engineering database system co - s _ dbs, and aimed at the requirements of the cooperative design for the privilege management, purpose a privilege management model s _ pmm. this model can not only provide the well - designed structure of the privilege control table and the paniculate privilege control, but also support role mechanism, positive and negative privilege mechanism, concealed privilege mechanism, which well satisfies the requirements of the cooperative design

    ( 4 )對co - s _ dbs工程數據庫系統的管理進行了深入的研究,針對協同設計對管理的要求設計了管理模型s _ pmm ,該模型提供了設計良好的製表結構,細粒度的權限控制,支持角色機、正負、隱式,很好的滿足了協同設計的要求。
  4. One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority

    摘要基於角色訪問( rbac )技術的一個重要概念就是角色,通過在用戶和訪問之間增加一個角色層,使得權限控制更為簡單且靈活有效。
  5. Critical transaction set and task authorization indicator are introduced to allow for finer granular permission control, thus some problems of complex constrains such as history - based separation of duty can be solved effectively, and this provide a good base for active access control

    通過引入臨界事務集合和任務授指示符,實現了細粒度的權限控制,能夠較好地解決基於歷史的職責分離之類的復雜約束問題,並為主動訪問奠定了基礎。
  6. Then the article introduces the design and realization of user level monitor module and kernel level monitor module detailedly, including how to realize the system clipboard monitor, the file motion control, file print job interdiction, and the directory share monitor in system ’ s user level, how to realize the process accessing filter, the process privilege control, the file encryption and decryption in system ’ s kernel level

    本文詳細給出了用戶層監模塊和內核層監模塊的設計和實現,包括如何在操作系統用戶層實現系統剪貼板監、文件移動、共享目錄監、文件列印阻斷等,如何在內核層實現進程訪問過濾、用戶進程權限控制、文件透明加解密功能。
  7. Grad products provide all the functionality expected from a state - at - the - art, high performance, full featured pacs and ris system, and will grow along with the users requirements. grad dedicate the integrated and perfect solutions to achieve the medical image information management for any hospital. this page is being constructed

    具備完善的用戶權限控制管理設計,提供用戶賬戶及的注冊管理能力,支持按用戶類型分組的用戶管理,特殊患者影像的加鎖以及用戶有效期管理用戶登錄的驗證管理等執行能力。
  8. It solves payment issue through sharing pos and brush card. it solves info sharing and exchanging problem by enterprise application integration it adopts research method of software engineering and uses touch - screen, network, database technology and so on to carry through total design of the system and build the software : it uses user status identify and responsibility control to ensure database and application program ' s security ; it strengthen the code by coding optimize ; it captures and discards application runtime error to enhance the system ' s stability ; it uses multimedia voice and moving picture to show help information, thus makes the system easy to use ; it greatly reduces the maintenance work of the system by self - updating function ; it is an opening system by using star - model network top structure, supporting standard network communication protocol ? tcp / ip and offering standard software interfaced criterion

    論文採用軟體工程的研究方法,使用觸摸屏、網路、數據庫等技術,進行了系統總體方案設計和軟體開發:通過對數據庫和應用程序的用戶身份識別和權限控制,保證數據存取和應用程序的安全性;通過對代碼進行優化提高了代碼的健壯性;通過捕捉並拋出系統運行時的異常錯誤提高了系統的穩定性;通過多媒體語音、圖形和動畫提示幫助信息來增強系統的易用性;客戶端程序自動升級功能提高了系統的可維護性,有效地減少了維護工作量;系統採用星型的網路拓撲結構,支持標準的tcp ip網路通訊協議和規范的軟體介面標準,具有良好的開放性。
  9. An improved mechanism of authorization control based on web environment

    環境下改進的權限控制
  10. However, for finer access rights control, you can use the

    但是,為獲得更細的訪問權限控制,可以使用
  11. Access control technology of multimedia learning system based on cscl

    一種用於多媒體學習系統的權限控制演算法
  12. Does mysql 5. 0 include support for roles based access control ( rbac )

    0是否支持基於角色的權限控制( rbac )呢
  13. Gets the level of access to smtp servers controlled by the permission

    獲取由權限控制的smtp服務器的訪問級別。
  14. Permissions control what your code is allowed to do and not do

    權限控制著代碼可以執行以及不可以執行哪些操作。
  15. Gets the level of access to network information controlled by this permission

    獲取對此權限控制的網路信息的訪問級別。
  16. The right to perform an operation that is controlled by a validated write access right

    執行由已驗證寫訪問權限控制的操作的
  17. Dimension data access controls which dimension attributes can be accessed by members of a role

    維度數據訪問權限控制角色成員可以訪問哪些維度屬性。
  18. There is, however, a built - in access control list mechanism involving flat files or databases

    但是,有一個內建的對普通文件和數據庫訪問的權限控制
  19. The research results is briefed as follow. ( 1 ) a new communication and decision - making method is presented, which integrated several new tools as well as some old ones ; ( 2 ) a new concept of " virtual communicating place shared in real time by multi - user " is brought forward, and a new technology based on event - driving and message - transferring mechanism is designed to realize graphic data shared by multi - user and displayed synchronously under net environment, which is the basis of the whole system. ( 3 ) a new mechanism for team members to share data efficiently is devised, which supports collaborative working in progress, maintains the consistency of data, records the history of design and etc. by defining a new type of the design data attributes and the privilege of team member to access to data in different time, using a new method of data manipulating, the team data sharing is realized

    本文的主要研究成果為: ( 1 )在研究國內外網路決策交流方式方法的基礎上,綜合多種方法的優點,提出了一種新的決策交流方式,採用了多種手段和工具,完善了網路決策交流的機; ( 2 )提出了多用戶共享的可視化虛擬交流空間的概念,並對其實現技術進行仔細的分析,針對目前存在的技術難點,提出了可行的解決方案,設計了一種新型的基於事件驅動和消息傳遞機的多用戶實時共享圖形數據的解決方案,並採用了跨平臺的java技術實現了網路環境下圖形數據的實時交流和顯示; ( 3 )針對團隊協同的網路cad系統的特點和要求,提出了一種新的團隊數據共享機,通過對產品數據的基本屬性、歷史屬性、共享狀態屬性和關聯屬性的定義,結合對團隊成員在不同設計階段的權限控制,採用新型的對共享數據庫的數據操作方法,動態地維護團隊數據的共享、設計的變更、設計進程的同步、關連數據的一致性、以及多個團隊之間的數據交流。
  20. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命令模式的持久層組件,封裝了數據庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的代碼冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問的安全子系統則初步實現了數據安全傳輸和權限控制;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
分享友人