access control

英 [ˈækses kənˈtrəʊl] 美 [ˈækses kənˈtroʊl]

访问控制

计算机



双语例句

  1. User roles and access control are inherent in Domino's database structure.
    用户角色和访问控制都是Domino数据库结构中与生具来的特性。
  2. Mandatory access control and role-based access control are relatively new to the Linux kernel.
    对于Linux内核来说,强制访问控制和基于角色的访问控制都是相对较新的功能。
  3. These support interactions with the Access Control model and with the Classification Systems.
    这些界面支持与访问控制模型和分类系统进行交互。
  4. Our clients take advantage of both role-based permission and fine-grained access control.
    我们的客户同时利用基于角色的权限和细粒度访问控制。
  5. Most of the current systems implement access control and authorization in a proprietary manner.
    目前多数系统都以专有的方式实现访问控制和授权。
  6. This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
    这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
  7. Both the deployment infrastructure and the registry also need access control, to prevent misuse.
    为了防止误用,部署基础设施和注册中心也都需要访问控制。
  8. The Configuration Management application now provides access control for configuration spaces and workspaces.
    ConfigurationManagement应用程序现在提供了对配置空间和工作区的访问控制。
  9. The full capabilities of authentication and access control are beyond the scope of this article.
    身份验证和访问控制的完整功能超出了本文的范围。
  10. Wikis have a set of users and access control rights.
    Wiki具有一组用户和访问控制权限。
  11. This includes functions such as loading and removing classification systems, and setting up access control policies.
    这包括诸如加载和删除分类系统以及设置访问控制策略等功能。
  12. The Community section provides asset review and approvals, access control, and notifications.
    Community部分提供资产审查和批准、访问控制和通知。
  13. Identity, roles, access control, and attributes.
    身份、角色、访问控制和属性。
  14. This demonstrates a level of access control available in Scala that does not exist in the Java language.
    这演示了Scala中特有的一种访问控制级别,而Java语言中不存在这种访问控制。
  15. Using the NOT operator, further restriction can be placed on access control.
    可以使用NOT操作符对访问控制进行进一步限制。
  16. JSR-170 supports many optional features, including access control, transactions, locking, and versioning.
    JSR-170支持许多可选特性,包括访问控制、事务、锁定和版本管理。
  17. A utilization service support tenants to maintain and configure their specific organization structure and access control data.
    利用服务支持租户维护和配置自己的组织结构和访问控制数据。
  18. Also available from the dashboard are support for alerts, operations, and user roles for access control.
    仪表板还提供了对于访问控制警报、操作和用户角色的支持。
  19. Information providing system and authentication medium access control method and computer program.
    MatsuoTakashi:信息处理系统和认证介质的访问控制方法和计算机程序。
  20. Basic user context and access control is supplied by the security manager.
    由安全管理器提供基本用户上下文和访问控制。
  21. Protect the global and application theme directories with proper access control settings.
    使用正确的访问控制设置来保护全局和应用程序主题目录。
  22. The dual function credential can interface with an electronic access control system and also operate the mechanical cylinders.
    双功能凭证可以同界面的电子门禁控制系统和机械操作气瓶接口。
  23. The system also allows more integration with third-party access control and physical security systems.
    该系统还允许有第三方的访问控制和物理安全系统的更多的整合。
  24. It offer a rich set of access control mechanism for you to secure document and programs.
    它提供了一套丰富的对文件及程序的存取控制机制。
  25. Virtual private networks: These networks provide access control and data encryption between two different computers on a network.
    虚拟专用网络:这些网络为同一网络内两台电脑间互相访问设置了访问控制和数据加密。
  26. It also offers multi-master replication, access control, and many extensions.
    它也可以提供多主复制,访问控制和许多扩展。
  27. The system is compatible with Mercury Security access control panels.
    该系统与水银的安全访问控制面板兼容。
  28. Is an employee identification system used for positive identification and access control?
    是否实施了员工身份认证系统和出入控制?
  29. In the design of large-scale information system, access control system part is always a complicate task.
    在大型信息系统的设计中,访问控制一直是一项复杂的工作。
  30. It can be expanded to support mass notification, video surveillance, building operation management, and access control.
    该系统可以扩展以支持大规模的通告,视频监控,建立经营管理和访问控制。