access control
美
英 
- un.入口控制;存取控制
- 网络访问控制;接入控制;门禁系统
英汉解释
英英解释
例句
The name of the system mutex whose access control security rules are to be retrieved.
要检索其访问控制安全性规则的系统mutex的名称。
The best way to explain access control is to use examples with real things rather than trying to relate to concepts.
试着解释访问控制概念的最好方法就是举个实例,这比纯粹进行概念阐述要好得多。
Label-based access control provides you with a method to have complete control on who can access the data in a very granular way.
基于标签的访问控制实现了对数据访问的细粒度控制。
Finally, check point and access control was used for fault tolerance and security of the system.
最后使用检查点和访问控制实现系统的容错和安全。
Because these objects are used in public folder access control lists (ACLs), it is crucial that this information be replicated correctly.
由于这些对象是在公用文件夹访问控制列表(ACL)中使用的,因此,正确复制此信息是至关重要的。
For more information about this conversion and its implications, see Public Folder Access Control in Mixed Mode.
有关此转换过程及其所涉及的问题的详细信息,请参阅混合模式下的公用文件夹访问控制。
Access Control List (ACL): An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(ACL):ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
An attempt to add a resource account to an Access Control List (ACL) failed because resource accounts do not have associated user accounts.
试图将资源帐户添加到访问控制列表(ACL)失败,因为资源帐户没有相关联的用户帐户。
Searches for a matching access control rule with which the new rule can be merged.
搜索可以将新规则与之合并的匹配访问控制规则。
Robust access control mechanism that isolates the system hardware and software totally form the user is enough to counter this attack.
用健壮的访问控制机制使用户与系统软、硬件完全隔离,就足够抵抗这类攻击。
The first bit of access control actually happens at login when a PAM module decides that Bob must log in to role cashier_r.
当PAM模块决定Bob必须登录到cashier_r角色中时,将实际发生访问控制的第一部分。
As you know, you can also provide access-control lists.
我们知道,您还可以提供访问控制列表。
Is an employee identification system used for positive identification and access control?
是否实施了员工身份认证系统和出入控制?
To optimize the management of access control, an IT organization might have a policy enforcement point or set of enforcement points.
为了优化对访问控制的管理,IT组织可能需要一个或一组策略实施点。
Each S3 object has an access-control list (ACL) associated with it that explicitly identifies the grants and permissions for that resource.
每个S3对象有一个相关联的访问控制列表(ACL),ACL显式地指定此资源的授权。
If there is no group with this name, it is created and given the multipurpose type, meaning it may be used for email or access control.
如果没有这个给定名称的组,就需要创建该组并为它提供通用类型,这意味着它可以用于电子邮件或访问控制。
But that access control knowledge is all confined to the Earth System Grid portal.
但是这种访问控制知识完全被限制在EarthSystemGrid门户中。
File security access control is the core of the bank automatic teller machine security.
文件安全访问控制,是银行自动柜员机安全的核心部分。
Role-based access control is one of the effective means to protect resources in a security system.
基于角色的访问控制是安全系统中保护资源的有效手段之一。
Specifies a user account , group account, or logon session to which an access control entry applies .
指定访问控制项应用于的用户帐户、组帐户或登录会话。
Pulling together information from a variety of sources also carries with it security concerns, including access control.
将多种来源的信息整合在一起将会带来包括访问控制在内的安全性问题。
A mutex provides exclusive access control for a resource between threads, as shown in.
所示,互斥提供线程间资源的独占访问控制。
Each of these application roles aggregates a set of very specific portal access control roles.
其中的每个应用程序角色都聚合一组非常特定的门户访问控制角色。
If ignore access control in caches is set to false for a portal page, a completely rendered page will not be cacheable at all.
如果将某个门户页面的忽略缓存中的访问控制设置为False,将不能对完全呈现的页面进行缓存。
Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.
在有这个命令之前,您需要使用Role-BasedAccessControl(RBAC)来帮助纠正setuid和setgid程序的问题。
The text has came up with an new thinking: active defense technology is drew into the access control of the information systems.
本文提出一种全新的思路,把主动防御技术引入到信息系统的权限控制中。
NOTE: This modification does not change or override any access control that may be in place for Lotus Notes-based components on the page.
注意:该修改不改变或覆盖页面上用于基于LotusNote的组件的任何访问控制。
This case will illustrate how different access control lists interact with a given set of queues.
这个用例将展示不同访问控制列表与特定队列集之间的交互。
This overload allows you to specify the access control action as will as the registry permission access.
这个多载可让您指定存取控制动作以及登录使用权限存取。
Increasingly seen as a necessary part of the comprehensive de- sign package, access control has prompted the growth of security technology.
门禁控制作为综合设计包必不可少的一部分,已带动了安全技术的发展,这是愈加显而易见的。
As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.
随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。
The inclusion of both field-level and instance-level access control lists satisfies the requirement for a thorough access-control mechanism.
包含有字段级和实例级访问控制列表满足了完全的访问控制机制的需求。
Gets a Boolean value that specifies whether the System Access Control List (SACL) associated with this ObjectSecurity object is protected.
获取一个布尔值,该值指定与此ObjectSecurity对象关联的系统访问控制列表(SACL)是否受到保护。
when working with access control entries , you specify a trustee to which you are assigning the rights.
在使用访问控制项时,您指定向其分配权限的受信者。
Additional access control is required for fine-grained protection of the assets associated with that service.
对与该服务相关联的资产的细粒度保护还需要其它访问控制。
Class with the specified sections of the access control security rules from the system semaphore with the specified name .
使用来自具有指定名称的系统信号量的访问控制安全性规则的指定部分来初始化。
EXtensible Access Control Markup Language (XACML) is an open standard for defining authorization to a resource.
可扩展访问控制标记语言(EXtensibleAccessControlMarkupLanguage,XACML)是用于为资源定义授权的开放标准。
This allows you to establish fine-grained access control for file system objects and support inheritance features.
这样使得您可以为文件系统对象建立细粒度的访问控制,并且支持继承特性。
XACML builds on SAML by providing the actual semantics used to define access control policy and authorization request and response messages.
XACML构建于SAML之上,提供了用于定义访问控制和授权请求及响应消息的实际语义。
It may be necessary to secure event payloads from unauthorized access using access control.
可能需要使用访问控制来保护事件负载免受未经授权的访问。