attribute access

英 [əˈtrɪbjuːt ˈækses] 美 [əˈtrɪbjuːt ˈækses]

网络  库存料品表; 属性访问

计算机



双语例句

  1. The primary attribute here is access.
    我们主要说的是与媒体的接触。
  2. Conflict set-A conflict set is a domain object attribute that restricts access to a domain based upon the existing domain ( s) access that an entity may already have defined.
    Conflictset:是一个域对象属性,能够根据某个实体可能已定义的现有域访问权限来限制对域的访问。
  3. The attribute FIRST in the ACCESS guideline element specifies that the table CUSTACC must appear as the outermost table when the tables in the FROM clause are joined.
    ACCESS准则元素中的属性FIRST指定在连接FROM子句中的表时,表CUSTACC必须作为最外层的表出现。
  4. To access the data, give the path of the attribute you want to access.
    要访问数据,请提供需要访问的属性所在的路径。
  5. While not used in this example, you can also use an arch attribute to further restrict access to a Java library.
    虽然在这个示例中没有用到这个值,但也可以使用arch属性进一步限制对Java库的访问。
  6. Our application maintains a HashMap for representing attributes of various entities; one such attribute is the list of access rights that a given user has.
    我们的应用程序维护一个代表各种实体的属性的HashMap,给定用户的访问权列表就是这种属性中的一种。
  7. However, because an element may have at most one attribute with a given name, access to attributes can be optimized.
    但是,由于一个元素对于一个给定名称最多有一个属性,因此可以优化对属性的访问权。
  8. Descriptors are a means of altering the behavior of attribute/ method access, which is an interesting programming technique in itself.
    描述符是一种改变方法/属性访问行为的手段,其本身就是一个有趣的编程技术。
  9. For example, the insertData method is used to set the value of CharacterData nodes, while the value of Attr ( attribute) nodes is set by direct access to a value field.
    例如,CharacterData节点的值是通过使用insertData方法来设置的,而Attr(属性)节点的值是通过直接访问value字段设置的。
  10. You can use a composite component's parent attribute to access attributes of the parent component, which greatly facilitates nesting of components.
    您可以使用一个复合组件的parent属性来访问父组件的属性,这一点极大地方便了组件的嵌套。
  11. This thesis brings forward the right attribute and capacity structure of information access right bough re-analysis of Peters reasoning process of information access freedom.
    阐述了信息自由的概念以及开放获取的背景及定义,分析了开放存取出版模式的优势,论述了在网络条件下开放获取对信息自由的推动。
  12. Model for Mutual Trust Attribute Deployment Mechanism Based Access Control
    基于互信属性调配机制的访问控制模型
  13. To rename an entry, the subject must have write access to entry's entry attribute and have write access to both the old parent's and new parent's children attributes.
    要重命名条目,则必须对条目的条目属性要有写权限以及对老的父节点和新的父节点的子节点属性要有写权限。
  14. Attribute Based Access Control End-user Security System Research and Achievement
    基于用户属性的终端安全防护系统研究与实现
  15. Attribute denying access to that site, then no code will execute.
    属性的策略,拒绝访问该站点,则不会执行任何代码。
  16. Study on attribute certificates-based access control based on web workflow system
    Web工作流系统中属性证书访问控制研究
  17. Then attribute database is set up with Microsoft Access.
    选用MicrosoftAccess建立泥石流灾害属性数据库;
  18. This paper introduces several attribute and means for access database in network with VB6.0.
    介绍用VB6.0实现ACCESS数据库在网络中同步的几个属性和方法。
  19. By utilizing the user management model of based on department, role, user and ranking security level of each attribute of object, we can control access to each field of table of RDBMS in intranet system.
    同时利用基于部门、角色和用户的人员管理模式,并将对象属性访问控制进行安全分级,为关系型数据库中的信息安全提供字段级控制。
  20. Injecting RBAC mechanism into task nodes to restrict the role attribute can secure the access control of the workflow.
    在任务节点中引入RBAC机制对角色属性进行约束以实现对工作流的安全存取控制。
  21. The basic spatial database has been established by the "4D" product; and attribute database has been finished by Microsoft Access, etc.
    基础空间数据库以4D产品的形式建立,属性数据库则用MicrosoftAccess商业数据库软件完成。
  22. Research on attribute-based authorization and access control
    基于属性的授权和访问控制研究
  23. It abstracts various application class of TCP/ IP based on this framework and defines the security attribute and access control rules of each TCP/ IP layer. As a result, a TCP/ IP access control framework supported by operating system security is built.
    在此框架的基础上抽象出TCP/IP协议的各层应用类,并定义了各层应用类的安全属性赋值规则和访问控制规则,建立了一个操作系统安全支持的TCP/IP访问控制框架。
  24. PMI prototype consists of three components: attribute certificate management module, access control module and system management module. The paper describes the design and implementation of the three modules in detail.
    本文对PMI原型的三大模块包括属性证书管理模块、访问控制模块和系统管理模块的设计和实现进行了详细的描述。
  25. The two main points of this paper, one is detailed description of every field of Attribute Certificate and its function in access control.
    本文研究的重点有两个方面,一是对属性证书的各个域的具体含义作了详细描述,并且分析了各个域在访问控制及证书的管理的过程中的作用;
  26. Analysis of the Legislative Attribute of Property Right of Access to Farmland
    探析农地使用权的物权法律属性
  27. Study on Attribute-Based Access Control for Web Services
    面向Web服务的基于属性的访问控制研究
  28. A resource abstract model under Manufacturing Grid environment was put forward to present resource attribute information and to define access interfaces.
    提出了制造网格环境下的资源统一抽象模型,用于描述资源属性信息和定义访问接口。
  29. This article proposed that using the attribute based access control model to solve the problem in this kind of system in order to realize the secure access.
    本文提出使用基于属性的访问控制模型实现SOA环境下Web服务系统的安全访问。
  30. We designed the algorithm of calculation attribute semantic similarity in cross-domain access and realized the domain of mapping between attributes, which reduced the complexity of attribute management and raised the security of the cross-domain access.
    在跨域访问时,设计了计算属性语义相似度的算法,实现了域间属性的映射。这样不仅简化了对域间异构属性的授权策略管理,而且提高了跨域访问的安全性。