訪問限制 的英文怎麼說

中文拼音 [fǎngwènxiànzhì]
訪問限制 英文
access restrictions
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 限制 : place [impose] restrictions on [to]; astrict; restrict; limit; confine; shut down on [upon]: 限制...
  1. The users are managed based on roles and grades, the types of users are : anonym, student, teacher and administrator, implement secure management by setting access control privilege specially

    用戶管理採用基於角色的分級管理模式。將用戶主要分為匿名用戶、學生、教師和管理員四種類型,通過對其分別設置來實現安全和管理。
  2. One of the important concepts in role - based access control ( rbac ) technique is the role, which makes the priority control simpler, more flexible and more efficient by adding a role - layer between the user and the access priority

    摘要基於角色( rbac )技術的一個重要概念就是角色,通過在用戶和之間增加一個角色層,使得權更為簡單且靈活有效。
  3. 6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data

    6 )採用嚴格的方式與權管理機。 fsca系統充分保證了用戶數據的合法性與有效性。
  4. It checks the access control list of the. aspx or. asmx handler file to determine whether a user should have access to the file

    它檢查. aspx或. asmx處理程序文件的列表( acl )以確定用戶是否應該具有對文件的
  5. From document level actions, privileges with fine granularity such as create, read, update, delete, print, annotation modify, to resource manager collection access control, ibm db2 content manager ensures proper access and use

    從文檔級動作,創建、讀取、更新、刪除、列印的細粒度權和注釋修改,到resource manager集合, ibm db2 content manager都可以保證正確實現和使用。
  6. Traditional access control model hardly consider the issue of subjects ' trust worthiness and privilege partition

    傳統模型在授權過程中沒有考慮主體的信任度和權集合劃分等題。
  7. How can i restrict access for a single web service to authorized users roles

    :我怎樣才能把對單個web服務的訪問限制到經過授權的用戶角色?
  8. The access restrictions previously placed on the range

    先前設置在范圍上的訪問限制
  9. The assembly cache provides no guarantee of access restriction

    程序集緩存不保證訪問限制
  10. Access restrictions are ignored for fully - trusted code

    對于完全受信任的代碼忽略訪問限制
  11. Access restrictions are ignored for fully trusted code

    對于完全受信任的代碼忽略訪問限制
  12. Namespaces have no access restrictions

    命名空間沒有訪問限制
  13. Removes the access restriction on a range of bytes previously restricted with

    的位元組范圍的訪問限制
  14. Removes the access restriction on a range of bytes previously restricted with the

    方法的位元組范圍的訪問限制
  15. Limit the method access to callers having whatever permissions you select

    將方法訪問限制為擁有您選擇的任何權的調用方。
  16. 0x00000010 specifies that the cache provide no guarantees of access restriction

    ( 0x00000010 )指定緩存不提供訪問限制保證。
  17. Specifies that one or more declared programming elements have no access restrictions

    指定一個或多個聲明的編程元素沒有訪問限制
  18. In addition, access to the server is restricted to cas and ras only via access restriction in the server document

    )此外,通過服務器文檔中的訪問限制把對服務器的訪問限制為ca和ra 。
  19. Also, its electrical quality and bus topology are mastered as well as the differences among the four data flow types that consist of data pattern, transmitting direction, the capacity limitation of data pocket, and the bus interview confinement the design and test of hardware circuit with usb interface are finished

    掌握其電氣連接特性、拓撲結構及四種傳輸方式在數據格式、數據包容量、總線訪問限制等方面各自不同的特徵。 2 .進行了系統硬體電路的設計與調試。
  20. Access restrictions are ignored for fully trusted code ; that is, private constructors, methods, fields, and properties can be accessed and invoked through

    對于完全受信任的代碼將忽略訪問限制;即,只要代碼是完全受信任的,就可以通過
分享友人