×

访问控制权限 meaning in Chinese

access control right

Examples

  1. In addition to sql server service startup accounts , access control permissions may have to be granted to built - in accounts or other sql server service accounts
    除sql server服务启动帐户外,可能还必须向内置帐户或其他sql server服务帐户授予访问控制权限
  2. The users are managed based on roles and grades , the types of users are : anonym , student , teacher and administrator , implement secure management by setting access control privilege specially
    用户管理采用基于角色的分级管理模式。将用户主要分为匿名用户、学生、教师和管理员四种类型,通过对其分别设置访问控制权限来实现安全访问和管理。
  3. Second , in according to the application security needs , the set of discretionary access permissions has been extended to twelve permissions , such as create / delete / getattr / setattr . these additional permissions have been added and implementation defined for different objects
    二、针对不同类型的客体,根据实际需要,将访问控制权限由原来的读、写、执行细化到创建、删除、读取属性和修改属性等12种。
  4. Support a large numbers of users ? since wireless carriers and portals support millions of subscribers , the wireless platform must provide facilities to centrally manage / provision these users , their security and access control privileges , and their ability to personalize services
    支持大量用户? ?因为无线运营公司和门户支持上百万的用户,所以无线平台必须提供工具来集中管理配置这些用户、用户安全和访问控制权限,以及用户个性化服务的能力。
  5. After strict formal analysis with ban logic , the result have proved that the authentication protocol is secure . the improved access control scheme is realized by the mode of single - key - lock - pair . under new access control scheme , user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees , and the possibility of overflow problem is significantly reduced by our new method
    作为对原双向认证访问控制方案的改进,改进后的双向身份认证协议可以很好的抵抗中间人攻击和重放攻击,经过严密的ban逻辑形式分析和论证,结果表明该协议是安全的;改进后的访问控制方案用单钥-锁对方案实现,除保持了一般单钥-锁对方案的良好动态特性外,在不需要访问权限递增假设下,实现了用户对文件的多种访问控制权限,并大大减小了溢出问题的发生可能

Related Words

  1. 批准权限
  2. 访问访问点
  3. 访问矩阵
  4. 连续访问
  5. 访问许可
  6. 实时访问
  7. 访问冲突
  8. 复查访问
  9. 突然访问
  10. 访问码
  11. 访问控制判决信息
  12. 访问控制器
  13. 访问控制实施功能
  14. 访问控制数据库管理
PC Version

Copyright © 2018 WordTech Co.