Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control.
利用对象的继承特性引入细粒度权限管理的概念,把资源的控制从菜单粒度分解到原子操作粒度。
Access to education is an essential part of one's privilege regardless of one's gender, culture, and family background.
无论一个人的性别、文化和家庭背景如何,接受教育都是其特权不可缺少的一部分。
Any operating system user can potentially access DB2; however, unless they have been granted a given DB2 authority or privilege, there is not much they can do.
任何操作系统用户都有可能访问DB2;但是,除非他们被授予给定的DB 2权限或特权,否则他们能做的事情不多。
For example, at replication, every user is assigned exactly the same privilege set, which implies that no fragmentation of access rights in CM is made.
例如,在复制过程中,每个用户被赋予相同的权限集,这意味着CM中不会出现有所区别的访问权限。
With the help of examples, this article highlights privilege sets and Access Control Lists (ACLs) to be granted to CM entities like users, usergroups, itemtype, item, workflow, and so on.
本文借助示例演示了权限集合和访问控制列表,并授权给 CM实体,如用户、用户组、项目类型、项目、工作流等。
Most of the rest of the policy merely is there to grant the container sufficient privilege to access bits of the system: network ports, devices, consoles, etc.
剩余的策略主要是授与容器充分的特权,以访问系统的各个部分:网络端口、设备和控制台等。
Define a transformation of access rights (ACLs, privilege sets).
定义访问权限(acl,权限集)的转换。
The user needs to have the edit access in his Max privilege set.
用户的最大权限集合中应该包含编辑访问权。
In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more.
Android系统通过这种方式实现最低权限原则(the principleofleast privilege).也就是说,每个应用在只需要完成自己的功能而不需要其他服务的时候,默认只对自己的组件有访问权限。
This provides more secure access than a traditional alternative: Run the Web server as root (!), with instances switching to the privilege of the file accessor.
与传统备选方法相比,这种方法提供了更安全的访问:以 root 的身份运行Web服务器,并提供转换到文件访问器权限的实例。
Give users the minimum amount of access to functions and modules that allow them to do their jobs, and take away that privilege at the earliest convenient time.
向用户提供完成其工作所需的最低功能和模块访问权限,并在不需要时尽早收回。
Cause 2: If you are using the NTFS file format, make sure that "aspnet" has proper privilege on "wwwroot" or your folder for virtual directory to access and write on the folders.
原因2:如果您正在使用NTFS文件系统的话,确保aspnet帐户对于wwwroot或您的应用程序文件夹具有适当的读写权限。
Still, that humble greeting marked the start of a phenomenon that has become such an important part of modern life that many experts argue access to it should be a right rather than a privilege.
尽管如此,这条谦卑的祝贺标志着一种现象的开端,它已经变成了现代生活的一个重要组成部分,许多专家认为它应该是一项权利而不是一项特权。
The important content of PMI(Privilege Management Infrastructure) and model is to realize the efficient management of authorization and access control.
PMI体系和模型的核心内容是实现授权与访问控制的有效管理。
The ISO10181 access control framework and the Privilege Management Infrastructure PMI are analyzed, and a Cross Trust Regions Authorization Framework(CTRA) is designed.
分析ISO10181访问控制框架与权限管理基础设施PMI,提出了跨信任域的授权模型CTRA。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.
论文在对自主访问控制、强制访问控制和基于角色的访问控制的访问控制策略及机制分析、研究基础上,选择并实现了基于角色的权限管理系统。
The goal of the thesis is to develop a user privilege management system as a subsystem of MIS of special items to provide user management and access control functions.
论文的研究目标是为特种物品MIS开发一个用户权限管理系统,作为子系统为特种物品MIS提供用户管理和权限控制的功能。
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
The system consists of the privilege management subsystem and the access agent subsystem.
整个系统由授权管理和访问代理两个子系统组成。
Access to MySQL user accounts with 'SUPER' privilege is denied. Tasks such as configuring replication that require SUPER are handled through RDS stored routines.
不允许访问具有“SUPER”权限的MySQL用户帐户,如配置需要SUPER的复制的任务通过RDS存储例程来处理。
Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.
借鉴基于角色的访问控制基本思想,结合开发实践,提出了一种用VJ实现用户权限管理的方法。
"The United States offers some of the world's lowest barriers to trade," said Obama. "and when we give other countries the privilege of that free and fair access, we expect it in return."
美国的贸易壁垒在全世界是最低的,我们给予其他国家的货物自由和公平的准入特权,我们希望他们也能够这样做。
Programs running inside the SPU need to be rather simplistic and self-contained, so you don't need complicated access protection or different privilege modes in the SPU itself.
在SPU内部运行的程序需要非常简单,而且是自包含的,因此在SPU中并不需要复杂的访问保护或不同的优先级模式。
Browse datasheets, white papers, technical briefs, and support documents so you can streamline user identity management, privilege access and security.
浏览数据表、白皮书、技术简报和支持文档,以便可以快速集成到在线身份。
Browse datasheets, white papers, technical briefs, and support documents so you can streamline user identity management, privilege access and security.
浏览数据表、白皮书、技术简报和支持文档,以便可以快速集成到在线身份。
应用推荐