access authority

英 [ˈækses ɔːˈθɒrəti] 美 [ˈækses əˈθɔːrəti]

网络  访问权; 访问权限

计算机



双语例句

  1. One method to satisfy the access authority on file access is to implement an access control list ( ACL).
    对文件访问进行访问授权的一种方法是实现访问控制列表(ACL)。
  2. If that user ID is later retired ( e.g.the user leaves the company) or if the user no longer needs database access or authority on database objects, a DBA must revoke privileges from the user.
    如果那个用户ID后来不用了(例如这位用户离开了公司),或者如果该用户不再需要数据库对象上的数据库访问或权限,那么DBA必须撤销该用户的特权。
  3. Ownership of files in Linux and access authority are closely related to user ids and groups, so let's review some basic user and group information.
    Linux的文件所有权和访问授权是与用户id和组密切相关的,所以我们要复习一下基本的用户和组信息。
  4. Role of the established user and access authority can not exceed those of the creator itself.
    被创建的用户角色及访问权限不能超过创建者自身。
  5. A File Upload and Download System with File Access Authority
    一种能实现文件权限控制的文件上传下载系统
  6. The Key technologies have database connection pool, vml, and safe strategy using role management, system function authority control and database access authority.
    用到的关键技术有数据库连接池技术、VML技术,并采用了角色管理、系统功能模块权限控制与数据库访问权限控制等安全策略。
  7. An access authority control mechanism of topic and resource is designed.
    结合政务资源对安全性要求高的特点,设计了主题和资源的访问权限控制机制。
  8. In the RBAC model, each intended user for a resource is mapped to a Role type, which is defined by the resources manager. And resources holders can set the access authority for each Role type based on different access control polices.
    RBAC规定每一个资源的潜在用户均对应于一个资源控制方定义的一个Role类型,而控制方为每一个Role类型定义其访问权限。
  9. Adopting the digital signature, the access setting authority based on roles and software logical lockout, the security problem of examination and approval in power dispatching based on network could be ensured.
    并通过引入数字防伪签名技术、基于角色存取控制的权限设置以及软件逻辑闭锁,解决了电力调度网络审批的安全问题。
  10. Access authority to each application model is assign to user groups, and one user must have the identity of proper user groups to gain the access to specific application model.
    用户的身份通过指定所属的用户组来控制,根据用户组来确定应用模型的访问权限,属于某个用户组的用户能够访问特定的应用模型。
  11. The sharing of asynchronous information is realized using ASP technology. The network security mechanism of the system is built to control the calling and the access authority of product data and the checking of designing process.
    利用ASP技术实现异步信息的共享,同时建立必要的网络安全协议,实现产品数据的访问与检查权限控制和设计过程控制。
  12. This paper proposes a structured-based file access control and authority model and its solution, which pull the control grain to the file content and semantic level. This model can be compatible with the existing file access control, extensible and able to use-define as well.
    文章给出了一种结构化文件访问控制和权限管理的模型和解决方案,使得控制的粒度达到文件内容和语义的层次,能和现有的文件访问控制兼容,同时具有可扩展、用户自定义的特点。
  13. The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.
    系统实现了基于ACL的访问控制,支持部门、用户、群组及用户访问权限的动态配置与管理。
  14. The system is designed for teachers to control students 'upload and download authority under B/ S structure. A catalogue index is created for the object folder of upload and download, for which different file access authority properties could be set.
    对上传下载的目标文件夹创建目录索引,再为索引设置不同的文件操作权限等属性,实现了B/S模式下教师能控制学生上传下载权限的文件上传下载系统。
  15. Based-on RBAC, the access control and authority management can accomplish united authority management and scrupulous access control by applying role pattern and proxy pattern.
    访问控制和权限管理采用RBAC模型(基于角色的访问控制模型),应用Role模式和代理模式,做到了统一的权限管理和细粒度的访问控制。
  16. Metadata is managed by metadata server which includes the attributes and access authority of file.
    元数据包括文件的属性和访问权限,由元数据服务器管理;
  17. So that the owner of the resources could implement access control, authority management, trust management using his security policies under the support of PKI.
    使依托于PKI系统的资源的管理者可以根据自身的安全策略实现对资源的访问控制、权限管理、信任管理等。
  18. Because of the diversity of traditional access control models, it is difficult to effectively judge whether the service requester has the access authority in cross-domain services as well difficult to solve the authorization troubles during cross-domain accesses.
    传统访问控制模型的多样性导致在跨域访问的过程中,无法有效地辨别服务请求者是否拥有访问服务的权限,不能很好地解决跨域访问的授权问题。
  19. The access control mechanism is based on the model of role and business flow status and extension of SOAP message, which can determine access authority according to parameters of service requestor, such as identity, status in business flow.
    该机制将基于角色和业务状态的访问控制模型与扩展SOAP消息相结合,能够根据调用者的身份信息、状态信息,判断本Web服务访问请求的访问权限。
  20. This thesis presents taking advantage of predicate clause consisted of resource property to express resource access authority whose clause set corresponds to a role segment, and gives methods of integrating role segment permission sets into multi-dimensional role permission sets.
    本文提出以资源属性的谓词子句表示资源访问权限,角色分量对应资源访问权限的子句集,给出由角色分量的权限集合合成多维角色权限集合的方法。
  21. Shareholder is shareholder financial information access to power authority subject.
    股东是股东财务信息查阅权的行权主体。
  22. Before rule-matching, we need to check up the port access authority and discover unauthorized access in time.
    在进行规则匹配前,对端口的访问权限进行判定,及时发现非法访问。
  23. At last, the main algorithm of the system modules and some user interfaces are implemented. In addition, some solutions are brought up aiming for kinds of security problems, especially for database security and access control authority.
    最后设计了系统各模块的主要算法及实现界面,并针对系统中存在的数据库安全、操作权限控制等系统安全问题提出专门的解决方案。
  24. The local port access authority management policy not only has an effective management on access violation, but also can accelerate the rule-matching because we separate illegal access rules from rule base.
    该策略不仅能有效管理本地端口的非法访问行为,并且将非法访问策略从规则库中分离出来而加快匹配速度。
  25. Firstly, we make analysis about the structure and limitations of Snort rule base which is divided into the rules according to ports, and bring in a local port access authority management policy combined protocol analysis technology.
    论文首先对Snort规则库的组织结构进行分析,针对Snort规则库以端口号划分规则的不足之处,结合协议分析的特点,引入了本地端口权限管理策略。
  26. Local port access authority management policy offers information of source IP addresses and ports which are allowed to access the local application layer service ports. We set access authority for local ports, which allowed specific source IP address and port to access.
    其目的是为本地应用层服务端口设置允许访问的源IP地址和端口号信息。
  27. Specifically, it can through processing the summary of transmission data, to verify the integrity of data in the transmission or storage process. ( 3) Log management solution of monitoring user behavior and access control scheme of user access authority control is implemented.
    其中,通过对传输数据摘要的处理,以验证数据在传输或存储过程中的完整性。(3)设计并实现了监测用户行为的日志管理和控制用户访问权限的访问控制方案。
  28. This dissertation uses the First-Order Logic to describe the access authority of the agent, which is more flexible and expressive.
    文中采用一阶谓词逻辑描述主体的访问权限,具有更强的表达能力和灵活性。
  29. The facets of customer verification, access control, authority management, log audit, data encryption, digital signature are researched and implemented to some extent.
    具体对身份认证、访问控制、权限管理、日志审计、数据加密、数字签名等方面进行了研究和一定程度的实现。