access mask 中文意思是什麼

access mask 解釋
存取屏蔽
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • mask : n 1 假面具,偽裝,掩蔽物;面罩;防毒面具(= gas mask);【物理學】掩模;(劈劍,棒球等用)護面;...
  1. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的標識鑒別機制增加了新的用戶安全屬性,即安全標簽和審計掩碼,以增加對安全操作系統下強制存取訪問控制和審計機制的支持。
  2. Securable objects use the four high - order bits of the windows 2000 and windows nt access mask format to specify the generic access rights

    安全對象使用windows 2000和windows nt訪問掩碼格式的四個高序位來指定一般訪問權限。
  3. Represents a combination of a user s identity, an access mask, and an access control type allow or deny

    表示用戶的標識、訪問掩碼和訪問控制類型(允許或拒絕)的組合。
  4. The access mask is propagated only to child objects

    僅將訪問掩碼傳播到子對象。
  5. Objects contain a 32 - bit access mask and a

    對象都包含一個32位的訪問掩碼和一個
  6. The access mask is propagated onto child leaf objects

    將訪問掩碼傳播到子葉對象上。
  7. The access mask is propagated to child container objects

    將訪問掩碼傳播到子容器對象。
  8. Represents a combination of a user s identity and an access mask

    表示用戶的標識和訪問掩碼的組合。
  9. Gets the access mask for this rule

    獲取此規則的訪問掩碼。
  10. Any access control entry with a zero - access mask is removed

    具有零訪問掩碼的任何訪問控制項( ace )將被移除。
  11. Certain combinations of inheritance and access mask flags are meaningless

    繼承和訪問掩碼標志的某些組合是無意義的:
  12. The access mask for this

    對象的訪問掩碼。
  13. An audit rule represents a combination of a user s identity and an access mask

    審核規則表示用戶的標識和訪問掩碼的組合。
  14. Vdd relies on the i / o permission mask to trap port access, and it essentially simulates the operation of hardware for the benefit of applications that were originally programmed to talk directly to hardware on a bare machine

    一個vdd依賴於一個i / o許可程序來限制埠訪問,並且它本來(是要)效仿硬體的操作,來幫助應用在一個裸機上同硬體直接對話的最初操作。
  15. A vdd relies on the i / o permission mask to trap port access, and it essentially simulates the operation of hardware for the benefit of applications that were originally programmed to talk directly to hardware on a bare machine

    一個vdd依賴於一個i / o許可程序來限制埠訪問,並且它本來(是要)效仿硬體的操作,來幫助應用在一個裸機上同硬體直接對話的最初操作。
  16. Introduced a new way for dispersion compensation in transmission using uniform fiber bragg gratings. at the last, the analysis of fiber grating production with a phase mask was carried out. based on diffraction and interference theories, we access the near - field optical intensity distributions produced by a periodic mask and draw the important conclusion that we must put the mask near the fiber as we can in the experiment

    最後論文討論了光纖光柵的製作,分析了掩膜板后干涉光場的分佈,指出了掩膜板製作應該盡量實現零級抑制,且在系統調試中,光纖要盡量靠近掩膜板放置這一重要結論,在此基礎上利用現有實驗設備製作出了光纖光柵,研究了不同曝光條件對光柵製作的影響,並利用實驗分析了光柵的溫度穩定性。
  17. The windows 2000 and windows nt access mask format includes a set of bits for the standard access rights

    Windows 2000和windows nt訪問掩碼格式包括標準訪問權限的位集。
  18. This scheme describes the relation of role hierarchy with dag and role ’ s permissions withacm ( access control mask ), solve key technology problems

    該方案採用有向無環圖描述角色的繼承關系,用訪問控制掩碼描述角色的權限,解決了基於角色訪問控制在實現中的關鍵問題。
  19. Because it is relatively simple to modify or mask code s identity, denying access based on identity alone is not a reliable way of protecting your code and the resources it accesses from unauthorized access

    因為修改或屏蔽代碼的標識比較容易,所以單獨根據標識來拒絕訪問並不是保護您的代碼及其訪問的資源不受未經授權訪問的可靠方法。
  20. Parameter specifies an access mask that identifies the requested types of access to the access token

    參數指定一個訪問掩碼,該掩碼向訪問標記標識所請求的訪問類型。
分享友人