| 1. | Information technology - role based access control 信息技术.基于作用的存取控制 |
| 2. | For more information about role - based access , see 有关基于角色的访问的详细信息,请参阅 |
| 3. | Role - based access control in network information distribution 网络信息发布中基于角色的控制 |
| 4. | That said , index - based access is still really useful 然而,基于索引的访问仍然有实际用途。 |
| 5. | Came the requirement for user - based access control ) ,出现了对基于用户的访问控制的要求。 |
| 6. | How to set up and configure the role of role - based access control 基于角色的访问控制中角色的划分 |
| 7. | You can also use index - based access for your attribute work 您还可以用基于索引的访问方法来使用属性。 |
| 8. | This thesis proposes a role - based access control policy frame 文章提出了基于角色的访问控制策略框架。 |
| 9. | A model of task - role based access control and its application 一种基于任务和角色的访问控制模型及其应用 |
| 10. | Setting acl - based access rights 设置基于acl的访问权限。 |