訪問限制 的英文怎麼說
中文拼音 [fǎngwènxiànzhì]
訪問限制
英文
access restrictions- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 限 : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
- 制 : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
- 訪問 : visit; call on; interview; access; addressing; reference to
- 限制 : place [impose] restrictions on [to]; astrict; restrict; limit; confine; shut down on [upon]: 限制...
-
The users are managed based on roles and grades, the types of users are : anonym, student, teacher and administrator, implement secure management by setting access control privilege specially
用戶管理採用基於角色的分級管理模式。將用戶主要分為匿名用戶、學生、教師和管理員四種類型,通過對其分別設置訪問控制權限來實現安全訪問和管理。One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority
摘要基於角色訪問控制( rbac )技術的一個重要概念就是角色,通過在用戶和訪問權限之間增加一個角色層,使得權限控制更為簡單且靈活有效。6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data
6 )採用嚴格的訪問控制方式與權限管理機制。 fsca系統充分保證了用戶數據訪問的合法性與有效性。It checks the access control list of the. aspx or. asmx handler file to determine whether a user should have access to the file
它檢查. aspx或. asmx處理程序文件的訪問控制列表( acl )以確定用戶是否應該具有對文件的訪問權限。From document level actions, privileges with fine granularity such as create, read, update, delete, print, annotation modify, to resource manager collection access control, ibm db2 content manager ensures proper access and use
從文檔級動作,創建、讀取、更新、刪除、列印的細粒度權限和注釋修改,到resource manager集合訪問控制, ibm db2 content manager都可以保證正確實現訪問和使用。Traditional access control model hardly consider the issue of subjects ' trust worthiness and privilege partition
傳統訪問控制模型在授權過程中沒有考慮主體的信任度和權限集合劃分等問題。How can i restrict access for a single web service to authorized users roles
:我怎樣才能把對單個web服務的訪問限制到經過授權的用戶角色?The access restrictions previously placed on the range
先前設置在范圍上的訪問限制。The assembly cache provides no guarantee of access restriction
程序集緩存不保證訪問限制。Access restrictions are ignored for fully - trusted code
對于完全受信任的代碼忽略訪問限制。Access restrictions are ignored for fully trusted code
對于完全受信任的代碼忽略訪問限制。Namespaces have no access restrictions
命名空間沒有訪問限制。Removes the access restriction on a range of bytes previously restricted with
限制的位元組范圍的訪問限制。Removes the access restriction on a range of bytes previously restricted with the
方法限制的位元組范圍的訪問限制。Limit the method access to callers having whatever permissions you select
將方法訪問限制為擁有您選擇的任何權限的調用方。0x00000010 specifies that the cache provide no guarantees of access restriction
( 0x00000010 )指定緩存不提供訪問限制保證。Specifies that one or more declared programming elements have no access restrictions
指定一個或多個聲明的編程元素沒有訪問限制。In addition, access to the server is restricted to cas and ras only via access restriction in the server document
)此外,通過服務器文檔中的訪問限制把對服務器的訪問限制為ca和ra 。Also, its electrical quality and bus topology are mastered as well as the differences among the four data flow types that consist of data pattern, transmitting direction, the capacity limitation of data pocket, and the bus interview confinement the design and test of hardware circuit with usb interface are finished
掌握其電氣連接特性、拓撲結構及四種傳輸方式在數據格式、數據包容量、總線訪問限制等方面各自不同的特徵。 2 .進行了系統硬體電路的設計與調試。Access restrictions are ignored for fully trusted code ; that is, private constructors, methods, fields, and properties can be accessed and invoked through
對于完全受信任的代碼將忽略訪問限制;即,只要代碼是完全受信任的,就可以通過分享友人