access control

access control

 英

  • un.入口控制;存取控制
  • 网络访问控制;接入控制;门禁系统

英汉解释

un.
1.
入口控制
2.
存取控制

英英解释

n.

例句

The name of the system mutex whose access control security rules are to be retrieved.

检索访问控制安全性规则系统mutex名称

The best way to explain access control is to use examples with real things rather than trying to relate to concepts.

解释访问控制概念最好方法就是实例纯粹进行概念阐述要好

Label-based access control provides you with a method to have complete control on who can access the data in a very granular way.

基于标签访问控制实现数据访问粒度控制

Finally, check point and access control was used for fault tolerance and security of the system.

最后使用检查访问控制实现系统容错安全

Because these objects are used in public folder access control lists (ACLs), it is crucial that this information be replicated correctly.

由于这些对象公用文件夹访问控制列表ACL使用因此正确复制信息至关重要

For more information about this conversion and its implications, see Public Folder Access Control in Mixed Mode.

有关转换过程及其涉及问题详细信息请参阅混合模式公用文件夹访问控制

Access Control List (ACL): An ACL is a data structure that associates to a set of principals a list of permissions for a service.

访问控制列表ACL):ACL一种数据结构一个服务权限列表主体关联

An attempt to add a resource account to an Access Control List (ACL) failed because resource accounts do not have associated user accounts.

试图资源帐户添加访问控制列表ACL失败因为资源帐户没有相关用户帐户

Searches for a matching access control rule with which the new rule can be merged.

搜索可以规则合并匹配访问控制规则

Robust access control mechanism that isolates the system hardware and software totally form the user is enough to counter this attack.

健壮访问控制机制使用户系统硬件完全隔离足够抵抗攻击

The first bit of access control actually happens at login when a PAM module decides that Bob must log in to role cashier_r.

PAM模块决定Bob必须登录cashier_r角色实际发生访问控制第一部分

As you know, you can also provide access-control lists.

我们知道可以提供访问控制列表

Is an employee identification system used for positive identification and access control?

是否实施员工身份认证系统出入控制

To optimize the management of access control, an IT organization might have a policy enforcement point or set of enforcement points.

为了优化访问控制管理IT组织可能需要一个策略实施

Each S3 object has an access-control list (ACL) associated with it that explicitly identifies the grants and permissions for that resource.

每个S3对象一个相关访问控制列表ACL),ACL显式地指定资源授权

If there is no group with this name, it is created and given the multipurpose type, meaning it may be used for email or access control.

如果没有这个给定名称需要创建提供通用类型意味可以用于电子邮件访问控制

But that access control knowledge is all confined to the Earth System Grid portal.

但是这种访问控制知识完全限制EarthSystemGrid门户

File security access control is the core of the bank automatic teller machine security.

文件安全访问控制银行自动柜员安全核心部分

Role-based access control is one of the effective means to protect resources in a security system.

基于角色访问控制安全系统保护资源有效手段之一

Specifies a user account , group account, or logon session to which an access control entry applies .

指定访问控制用于用户帐户帐户登录会话

Pulling together information from a variety of sources also carries with it security concerns, including access control.

多种来源信息整合一起带来包括访问控制在内安全性问题

A mutex provides exclusive access control for a resource between threads, as shown in.

互斥提供线程资源独占访问控制

Each of these application roles aggregates a set of very specific portal access control roles.

其中每个应用程序角色聚合非常特定门户访问控制角色

If ignore access control in caches is set to false for a portal page, a completely rendered page will not be cacheable at all.

如果某个门户页面忽略缓存访问控制设置False不能完全呈现页面进行缓存

Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.

这个命令之前需要使用Role-BasedAccessControl(RBAC帮助纠正setuidsetgid程序问题

The text has came up with an new thinking: active defense technology is drew into the access control of the information systems.

本文提出一种全新思路主动防御技术引入信息系统权限控制

NOTE: This modification does not change or override any access control that may be in place for Lotus Notes-based components on the page.

注意修改改变覆盖页面上用于基于LotusNote组件任何访问控制

This case will illustrate how different access control lists interact with a given set of queues.

这个用例展示不同访问控制列表特定队列之间交互

This overload allows you to specify the access control action as will as the registry permission access.

这个可让指定存取控制动作以及登录使用权限存取

Increasingly seen as a necessary part of the comprehensive de- sign package, access control has prompted the growth of security technology.

门禁控制作为综合设计必不可少一部分带动安全技术发展愈加显而易见

As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.

随着企业雇员人数增长维护数据适当访问控制成为项挑战

The inclusion of both field-level and instance-level access control lists satisfies the requirement for a thorough access-control mechanism.

包含字段实例访问控制列表满足完全访问控制机制需求

Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this ObjectSecurity object is protected.

获取一个布尔指定ObjectSecurity对象关联系统访问控制列表SACL是否受到保护

when working with access control entries , you specify a trustee to which you are assigning the rights.

使用访问控制指定分配权限信者

Additional access control is required for fine-grained protection of the assets associated with that service.

服务相关联资产保护需要其它访问控制

Class with the specified sections of the access control security rules from the system semaphore with the specified name .

使用来自具有指定名称系统信号量访问控制安全性规则指定部分初始

EXtensible Access Control Markup Language (XACML) is an open standard for defining authorization to a resource.

扩展访问控制标记语言(EXtensibleAccessControlMarkupLanguage,XACML)用于为资源定义授权开放标准

This allows you to establish fine-grained access control for file system objects and support inheritance features.

这样使得可以文件系统对象建立访问控制并且支持继承特性

XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.

XACML构建SAML之上提供用于定义访问控制授权请求响应消息实际语义

It may be necessary to secure event payloads from unauthorized access using access control.

可能需要使用访问控制保护事件负载受未经授权访问