privilege level

英 [ˈprɪvəlɪdʒ ˈlevl] 美 [ˈprɪvəlɪdʒ ˈlevl]

网络  特权等级; 权限等级; 特权级; 权限级别; 特权级别

计算机



双语例句

  1. Users designated as editors have the privilege level required to edit both the page and the widget.
    被指定为编辑者的用户具有编辑页面和小部件的权限。
  2. For example, the x86 STR instruction retrieves the security state, but the value returned is based upon the particular requester's privilege level.
    例如,x86STR指令可以检索安全状态,但是所返回的值要取决于请求者特定的特权级别。
  3. The user interface privilege level is at the process level.
    用户界面特权级别是进程级的。
  4. All applications run by a standard user have the same user interface privilege level.
    所有以标准用户运行的应用程序具有相同的用户界面特权级别。
  5. If the handler procedure is going to be executed at a numerically lower privilege level, a stack switch occurs.
    若当处理例程将运行于更高一级的特权级上时,堆栈发生切换。
  6. There is also a special process, the Kernel process, whose threads run at supervisor privilege level.
    另外更有一个特别的进程,内核进程,他运行在终极用户权限模式。
  7. You do no have sufficient privilege to raise the forest functional level.
    您没有足够的权限提升此林功能级别。
  8. UIPI does not interfere or change the behavior of window messaging between applications at the same privilege level.
    UIPI不干涉或改变处于同一特权级别的应用程序间的窗口消息行为。
  9. You do not have the proper privilege level to change the System Time.
    您没有适当的特权等级,所以无法更改系统时间。
  10. According to the access privilege of roles and the security level of features, the feature-based genus reduction and continuous multi-resolution model was put forward, and record metric α was defined to control assembly models with different resolutions achieved by different roles.
    依据角色的访问权限与特征的安全等级,提出了基于特征的种类删减连续多分辨率模型,定义记录度量α控制不同角色得到的不同分辨率的装配模型。
  11. As an important component of high-level secure operating systems, the privilege control mechanism can provide an appropriate level of security assurance for the system.
    特权控制机制是高安全等级操作系统中一个重要的组成部分,它能够提供系统恰当的安全保证级。
  12. Embedding the presented interrupt hook in applications can make the programs enter the system's kernel mode, thus realizing the low privilege level code's visiting of the high privilege level resources.
    实际应用表明,在应用程序中只要内嵌该软件中断钩子,就可进入系统内核态,实现低特权代码访问高特权级资源。
  13. For developing the USB driver, the mechanism of kernel management and the privilege level of applications in Windows 2000/ 98 are introduced, and the Windows driver model ( WDM) put forward by Microsoft is expounded.
    为了配合USB驱动程序的开发,简述了Windows2000/98的内核管理机制和应用程序的级别;阐述了微软提倡的驱动程序模型WDM;
  14. Windows 98's internal kernel structure and the privilege level of application programs is described. A brief introduction of several tools for developing the virtual device driver in Windows 98 is also provided, and an example of handling the interrupt in Windows 98 is given.
    介绍了Windows98的内核结构和应用程序的权限级别,简述了Windows98下虚拟设备驱动程序的开发工具,并给出了Windows98下一个中断程序实例。
  15. The nation chose two policies retreats under mandatory system changes, and the collective realized its privilege reconstruction in the basic level society re-organization process, while peasant persisted in its pursue of power through the crack of state will to power.
    国家在强制性制度变迁下选择了两次政策退却,集体在基层社会再组织化过程中实现了特权重构,而农民则始终没有放弃在国家权力意志的罅隙中对权利的追求。
  16. Research on privilege level transformation of the application in the user mode and its implementation
    用户态应用程序特权级转换的研究与实现
  17. The privilege protection principle in the virtual memory protected mode is analyzed, and an approach to privilege level transformation of the application in the user mode, the interrupt gate, is researched.
    通过分析虚拟内存保护模式下特权保护原理,研究用户态应用程序特权级转换的一种途径&中断门;
  18. Diamant distinguishes authorization activities between management level and access level, using different privilege models for each level.
    Diamant将授权活动划分为管理级和访问级,采用不同的特权模型有针对性的进行管理。
  19. Ii. Processes with higher privilege level, which restrict each other, monitor processes with lower privilege level.
    ii.位于高权力级别的,并且相互之间存在制约的多监控进程对位于低权力级别的应用进程实施监控。
  20. The security and usefulness of access control are enhanced from several different aspects by separating the privilege users 'permission, creating roles according to sharing level of data and using different authentication method for different security level permissions.
    提出了可以从对特权用户权限分散化,按功能或数据的共享级别划分角色,对不同安全级别的权限采用不同的认证方式这些方面来从不同角度提高系统访问控制的安全性和实用性。
  21. Two modules are integrated in VMM in order to running at the VMX Root operation that is a higher privilege level than the target OS priviledge level, which can ensure the effect of detection and protection.
    两个模块都集成于VMM中,以高于目标操作系统特权等级的VMXRoot模式运行,保证了检测的效果。