access mask 中文意思是什麼
access mask
解釋
存取屏蔽-
After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os
擴展后的標識鑒別機制增加了新的用戶安全屬性,即安全標簽和審計掩碼,以增加對安全操作系統下強制存取訪問控制和審計機制的支持。 -
Securable objects use the four high - order bits of the windows 2000 and windows nt access mask format to specify the generic access rights
安全對象使用windows 2000和windows nt訪問掩碼格式的四個高序位來指定一般訪問權限。 -
Represents a combination of a user s identity, an access mask, and an access control type allow or deny
表示用戶的標識、訪問掩碼和訪問控制類型(允許或拒絕)的組合。 -
The access mask is propagated only to child objects
僅將訪問掩碼傳播到子對象。 -
Objects contain a 32 - bit access mask and a
對象都包含一個32位的訪問掩碼和一個 -
The access mask is propagated onto child leaf objects
將訪問掩碼傳播到子葉對象上。 -
The access mask is propagated to child container objects
將訪問掩碼傳播到子容器對象。 -
Represents a combination of a user s identity and an access mask
表示用戶的標識和訪問掩碼的組合。 -
Gets the access mask for this rule
獲取此規則的訪問掩碼。 -
Any access control entry with a zero - access mask is removed
具有零訪問掩碼的任何訪問控制項( ace )將被移除。 -
Certain combinations of inheritance and access mask flags are meaningless
繼承和訪問掩碼標志的某些組合是無意義的: -
The access mask for this
對象的訪問掩碼。 -
An audit rule represents a combination of a user s identity and an access mask
審核規則表示用戶的標識和訪問掩碼的組合。 -
Vdd relies on the i / o permission mask to trap port access, and it essentially simulates the operation of hardware for the benefit of applications that were originally programmed to talk directly to hardware on a bare machine
一個vdd依賴於一個i / o許可程序來限制埠訪問,並且它本來(是要)效仿硬體的操作,來幫助應用在一個裸機上同硬體直接對話的最初操作。 -
A vdd relies on the i / o permission mask to trap port access, and it essentially simulates the operation of hardware for the benefit of applications that were originally programmed to talk directly to hardware on a bare machine
一個vdd依賴於一個i / o許可程序來限制埠訪問,並且它本來(是要)效仿硬體的操作,來幫助應用在一個裸機上同硬體直接對話的最初操作。 -
Introduced a new way for dispersion compensation in transmission using uniform fiber bragg gratings. at the last, the analysis of fiber grating production with a phase mask was carried out. based on diffraction and interference theories, we access the near - field optical intensity distributions produced by a periodic mask and draw the important conclusion that we must put the mask near the fiber as we can in the experiment
最後論文討論了光纖光柵的製作,分析了掩膜板后干涉光場的分佈,指出了掩膜板製作應該盡量實現零級抑制,且在系統調試中,光纖要盡量靠近掩膜板放置這一重要結論,在此基礎上利用現有實驗設備製作出了光纖光柵,研究了不同曝光條件對光柵製作的影響,並利用實驗分析了光柵的溫度穩定性。 -
The windows 2000 and windows nt access mask format includes a set of bits for the standard access rights
Windows 2000和windows nt訪問掩碼格式包括標準訪問權限的位集。 -
This scheme describes the relation of role hierarchy with dag and role ’ s permissions withacm ( access control mask ), solve key technology problems
該方案採用有向無環圖描述角色的繼承關系,用訪問控制掩碼描述角色的權限,解決了基於角色訪問控制在實現中的關鍵問題。 -
Because it is relatively simple to modify or mask code s identity, denying access based on identity alone is not a reliable way of protecting your code and the resources it accesses from unauthorized access
因為修改或屏蔽代碼的標識比較容易,所以單獨根據標識來拒絕訪問並不是保護您的代碼及其訪問的資源不受未經授權訪問的可靠方法。 -
Parameter specifies an access mask that identifies the requested types of access to the access token
參數指定一個訪問掩碼,該掩碼向訪問標記標識所請求的訪問類型。
分享友人