訪問特權 的英文怎麼說

中文拼音 [fǎngwènquán]
訪問特權 英文
access authority
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 特權 : privilege; prerogative
  1. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種控制的增強型安全設計原則,基於此原則建立了管理授和推薦式授的安全機制,用以提高系統的安全性,並大大減少授管理維護量;研究了殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的
  2. In this type of threat, an unprivileged user gains privileged access and thereby has sufficient access to compromise or destroy the entire system

    在這種威脅中,無的用戶獲得,因此可以通過來威脅或破壞整個系統。
  3. Running device drivers as unprivileged user - level code, encapsulated into their own process, has often been proposed as a technique for increasing system robustness

    從傳統的角度來說,設備驅動程序作為內核的一部分實現,因而在方式下執行,可以對所有的系統資源進行
  4. Information access privileges to health information

    健康信息殊授
  5. Database objects and access privileges

    數據庫對象和訪問特權
  6. Standard guide for information access privileges to health information

    健康信息的信息訪問特權的標準指南
  7. Always give a predetermined user name the minimal access privileges to a resource

    始終將資源的最少訪問特權給予預設用戶名。
  8. Supplier ' s confidentiality obligation survives termination of its access privileges

    供應商所應承擔的保密責任在其訪問特權終止后仍將繼續存在。
  9. In order to deploy to a web server, you must have administrative access privileges for that computer

    要部署到web服務器,您必須對該計算機擁有管理訪問特權
  10. Internet security - controls user access to sites or internet, can give different access privileges

    網安全-控制站點或網路的用戶,可授予不同的限。
  11. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全性策略配置目標包括控制對數據的原始、保護內核和系統軟體的完整性、防止有的進程執行危險的代碼,以及限制由有的進程缺陷所導致的傷害。
  12. Gets or sets a set of common access rights that map to both standard and object - specific access rights for reading, writing, and executing

    獲取或設置一組公共限,這些限映射到標準和對象定的限以用於讀取、寫入和執行。
  13. Emphasizes controlling access through least privilege and compartmentalization principles 4 and 5, respectively

    強調對通過最小(原則4 )和分隔(原則5 )的進行控制。
  14. Is displayed and a message box is shown to the user, indicating they did not have appropriate access privileges

    ,並向用戶顯示一個消息框,指出他們沒有相應的訪問特權
  15. If you have questions about your access privileges, please contact the titled individual you designated in your pin request for that account

    如果您對訪問特權有疑,請聯絡您在該帳戶的pin請求中指定的負責人。
  16. By default, services run in a different security context than that of the logged - in user. services run in the context of the default system account, called

    的默認系統帳戶的上下文中運行,該帳戶給服務提供的系統資源訪問特權不同於給用戶提供的。
  17. Supplier ' s confidentiality obligation with respect to each datum of information obtained from cg survives termination of its access privileges and continues until the datum becomes public knowledge

    終止供應商的訪問特權后,歸還了其從cg獲取每個數據信息的機密職責,直到數據成為公共信息后才能繼續其職責。
  18. This second installment covers inventory assessment, risk analysis, identifying user categories and access privileges, and then moves on to a more detailed action plan and steps for safely acquiring a linux distribution

    第2部分涵蓋了清單評估、風險分析、確定用戶類別和訪問特權,以及安全獲得linux發行版本的更詳細行動計劃和步驟。
  19. Message queuing code access security defines queue - specific operations or queue access that an application might require which is subject to security control ; it does not represent a right for the application to perform these operations or receive access in and of itself

    消息隊列代碼安全性定義應用程序可能需要的隊列定的操作或隊列(受到安全控制的制約) ;它不代表應用程序由其本身自行執行這些操作或接收限。
  20. These include functions for memory management, exception vector processing, privileged register access, and privileged timer access

    其中包括用於內存管理、異常向量處理、寄存器計時器的函數。
分享友人