| 1. | Access authorization information like user names and passwords 访问授权信息(比如用户名和密码) 。 |
| 2. | Log in to enter credentials for authentication and account access authorization 登录以输入认证和帐户访问授权的凭证。 |
| 3. | Any further access authorization is performed by ntfs file access permission s url authorization 任何进一步的访问授权均由ntfs文件访问权限的url授权来执行。 |
| 4. | Any attempt to perform these tasks without the proper access authorization will result in an exception error 在没有适当访问授权的情况下,任何执行上述任务的尝试都将导致异常错误。 |
| 5. | File access authorization can be issued using the classical coarse unix file permissions : read , write , and execute permissions on user , group , or world level 文件访问的授权可以使用传统的(粗糙的) unix文件权限来解决:用户、组或全体级别的读、写和执行权限。 |
| 6. | Upon its full completion , a generic mechanism will have been established for enabling a secure and user - friendly identity validation and access authorization for web - based cross - domain applications ; and 当该计划完成后,我们将拥有一个既安全又易用的通用机制,以方便在使用网上的跨领域应用系统时作为身份检查和使用权核实之用;及 |
| 7. | The thesis emphasize further research on both identity identification and authorization access based on role access control . a new identity identification protocol and a new method of access authorization are presented 论文着重对身份认证和基于角色的存取控制授权访问进行了深入研究,并提出新的身份认证协议和访问授权方法。 |
| 8. | Upon its full completion , a generic mechanism will have been established for enabling a secure and user - friendly identity validation and access authorization for web - based cross - domain applications ; and 当该计划完成后,我们将拥有一个既安全又易用的通用机制,以方便在使用网上的跨领域应用系统时作为身份检查和使用权核实之用;及 |
| 9. | In data security , the elimination of classified information from magnetic media to permit the reuse of the media at a lower classification level or to permit the release to uncleared personnel or personnel without the proper information access authorizations 在数据安全技术中,从磁介质中消去保密信息,使之可重新用于密级较低的场合或允许释放给未被认可参与机密事项的人员和没有正式的信息存取授权的人员使用。 |
| 10. | A departmental portal programme has been implemented at almost all bureaux and departments . upon its full completion , a generic mechanism will have been established for enabling a secure and user - friendly identity validation and access authorization for web - based cross - domain applications ; and 当该计划完成后,我们将拥有一个既安全又易用的通用机制,以方便在使用网上的跨领域应用系统时作为身份检查和使用权核实之用及 |