access privilege

英 [ˈækses ˈprɪvəlɪdʒ] 美 [ˈækses ˈprɪvəlɪdʒ]

网络  访问特权; 访问权限; 存取权; 存取特权; 权限

计算机



双语例句

  1. Any other user must have access privilege on the table as well as on the data file to work with the external table.
    要使用外部表,任何用户必须对外部表和数据文件拥有访问特权。
  2. This example assumes you have create, drop, and insert access privilege on a database called devworks.
    这一示例假设您在一个叫做devworks的数据库中拥有创建、删除和添加的访问特权。
  3. Authorization is the process of determining access and privilege information about specific database objects and actions for a supplied user ID. DB2 stores and maintains user and group authorization information internally.
    授权是这样一个过程:它为提供的用户ID确定关于特定数据库对象和操作的访问和权限信息。DB2在内部存储和维护用户和组的授权信息。
  4. Only high officials and their families had access to the privilege.
    只有高官与他们的家人才拥有这个特权。
  5. Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control.
    利用对象的继承特性引入细粒度权限管理的概念,把资源的控制从菜单粒度分解到原子操作粒度。
  6. When you assign author access to a user or server, you must also specify the create documents access level privilege.
    当分配对用户或服务器的作者访问级别时,还必须同时指定创建文档访问级别的权限。
  7. The study was carried out of how to implement role based access control by using role model in privilege management infrastructure ( PMI).
    研究了用权限管理基础设施(PMI)的角色模型实现基于角色的访问控制的相关问题,提出了一种改进PMI角色模型。
  8. TBAC considers the actual task when deciding whether an access privilege should be granted or not.
    TBAC判断是否授予主体访问权限时,要考虑当前执行的任务。
  9. According to the access privilege of roles and the security level of features, the feature-based genus reduction and continuous multi-resolution model was put forward, and record metric α was defined to control assembly models with different resolutions achieved by different roles.
    依据角色的访问权限与特征的安全等级,提出了基于特征的种类删减连续多分辨率模型,定义记录度量α控制不同角色得到的不同分辨率的装配模型。
  10. Thirdly, the thesis introduces the definition, system infrastructure, access control model and attribute certificate of Privilege Management Infrastructure.
    第三,本文介绍了PMI体系的定义、系统结构、访问控制模型以及属性证书等相关内容。
  11. In the scheme, the user's authenticating information is used not only for computing the corresponding access privilege to the intended file, but also for authenticating the requesting user not to illegitimately access the protected file.
    在该方案中,用户认证信息不仅用来计算对所需访问文件的存取权,也用于认证需访问保密文件的请求用户的合法性。
  12. This technology uses covering relationships in content-based ENS to define access privilege of clients.
    该技术使用基于内容的事件通知服务中的覆盖关系来定义系统客户端的访问权限。
  13. Introduces an efficient solution to the access control, the Privilege Management Infrastructure ( PMI) and its correlative public certificate infrastructure in an open distributed environment.
    介绍了授权管理系统PMI,它可以有效地解决在分布式环境下的授权和访问控制问题。
  14. The main contents of this paper are about the technologies of access control and privilege management, and the architecture of SSO system.
    论文主要研究该智能登录系统体系架构、访问控制和权限管理模型及实现技术。
  15. The system of Privilege Management and Access Control are made up of Privilege Management Infrastructure, Access Control Frame and Policy Regulation. In this system, Access Control Policy is the gist that users are accessed.
    权限管理基础设施,访问控制框架,策略规则共同构成权限管理和访问控制实施的系统平台,访问控制策略是决定用户访问权利的依据。
  16. This article analyses the properties of large MIS Networked System, introduces the Role-Based Access Control model into the administration of system privilege, then presents a system Access Control method based on the Application layer. This method appropriates the management structure of the company.
    该文分析了大型网络MIS系统的特征,将基于角色的访问控制模型引入系统权限管理,提出了一种符合企业管理结构的基于应用层的系统访问控制管理方式。
  17. To implement dynamic access control and avoid process deadlock and privilege leakage, the object group based on process instance was introduced. It was used to contain and manage the data used in process.
    在流程中,为实现动态授权,防止流程死锁和权限泄漏,引入基于流程实例的对象组,用于容纳在流程中的数据;
  18. In a data security system, there are four techniques for access control: firewall technique, ID authorization, access privilege control technique and audit tracking technique.
    在数据库安全系统中,访问控制主要有4种技术得以运用:防火墙技术、身份鉴别与认证技术、存取权限控制技术、审计跟踪技术。
  19. Based on the theory of PMI, this paper gives a revised privilege management model to implement access control and privilege management.
    本文作者在深入了解PMI的相关标准和现有模型的基础上,提出了自己的特权管理模型,实现了访问控制与权限管理的统一。
  20. An Access Privilege Control Model Based on Workflow Task Status
    基于工作流任务状态的访问权限分配模型
  21. This paper enhances the Linux operating system security mainly by finest granularity Discretionary Access Control ( DAC), Mandatory access control ( MAC) and Least Privilege Management.
    本论文主要在文件访问控制和特权管理这两方面对Linux的安全性进行增强,即实现了细粒度的自主访问控制、强制访问控制、以及最小特权管理。
  22. Information security is showing its more and more importance timely, in particular universal usage of web services, some technology such as identifying authentication, access privilege, security of data in communications, have been pushed on the top of current security research.
    信息安全的形势日趋紧迫,尤其是WebServices的广泛应用,使得身份认证、权限管理和分配,以及如何保障数据安全等技术,已经成为当前的研究焦点。
  23. The Access Control is divided into two parts, including relationship between access privilege and roles and relationship between roles and users, thereby it realizes the logical separation of users and privileges.
    整个访问控制过程被分成两个部分,即访问权限与角色相关联,角色再与用户关联,从而实现了用户与访问权限的逻辑分离。
  24. Recently, there are many group communication applications which ensure group members have multiple access privilege.
    现在的网络环境中,很多通信应用需要组成员拥有多层次的访问权限。
  25. For the process-oriented access control, this paper describes an access privilege control based on project and document, even including dynamic authorization for an operation process, moreover, the dynamic access control function is also given.
    对于面向过程的权限控制,本文详述了基于项目、文档的访问控制过程,以及动态权限申请访问过程,并定义了动态权限访问控制函数。
  26. Further more; the workflow engine is designed detailedly focusing on the message delivering, the process controlling, document version controlling and access privilege controlling.
    接着,围绕消息传递、流程控制、文档版本控制和权限控制几方面,对企业通用工作流的引擎进行了设计。
  27. With the in-depth application and rapid development of information technology. information security issues have become increasingly prominent, while access control and privilege management are important parts of security system.
    信息技术的深入应用与飞速发展,使得信息安全问题日益突出,访问控制和权限管理是系统安全体系中的重要环节。
  28. Diamant distinguishes authorization activities between management level and access level, using different privilege models for each level.
    Diamant将授权活动划分为管理级和访问级,采用不同的特权模型有针对性的进行管理。
  29. Access control and privilege management is the important part of management information system, and it relates to the security and reliability of the whole system.
    权限管理和访问控制是每个管理信息系统的重要组成部分以及重要环节,它关系到整个系统的安全性和可靠性,是系统安全运行的有力保证。