访问控制权限 meaning in English
access control right
Examples
- In addition to sql server service startup accounts , access control permissions may have to be granted to built - in accounts or other sql server service accounts
除sql server服务启动帐户外,可能还必须向内置帐户或其他sql server服务帐户授予访问控制权限。 - The users are managed based on roles and grades , the types of users are : anonym , student , teacher and administrator , implement secure management by setting access control privilege specially
用户管理采用基于角色的分级管理模式。将用户主要分为匿名用户、学生、教师和管理员四种类型,通过对其分别设置访问控制权限来实现安全访问和管理。 - Second , in according to the application security needs , the set of discretionary access permissions has been extended to twelve permissions , such as create / delete / getattr / setattr . these additional permissions have been added and implementation defined for different objects
二、针对不同类型的客体,根据实际需要,将访问控制权限由原来的读、写、执行细化到创建、删除、读取属性和修改属性等12种。 - Support a large numbers of users ? since wireless carriers and portals support millions of subscribers , the wireless platform must provide facilities to centrally manage / provision these users , their security and access control privileges , and their ability to personalize services
支持大量用户? ?因为无线运营公司和门户支持上百万的用户,所以无线平台必须提供工具来集中管理配置这些用户、用户安全和访问控制权限,以及用户个性化服务的能力。 - After strict formal analysis with ban logic , the result have proved that the authentication protocol is secure . the improved access control scheme is realized by the mode of single - key - lock - pair . under new access control scheme , user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees , and the possibility of overflow problem is significantly reduced by our new method
作为对原双向认证访问控制方案的改进,改进后的双向身份认证协议可以很好的抵抗中间人攻击和重放攻击,经过严密的ban逻辑形式分析和论证,结果表明该协议是安全的;改进后的访问控制方案用单钥-锁对方案实现,除保持了一般单钥-锁对方案的良好动态特性外,在不需要访问权限递增假设下,实现了用户对文件的多种访问控制权限,并大大减小了溢出问题的发生可能