Access to education is an essential part of one's privilege regardless of one's gender, culture, and family background.
无论一个人的性别、文化和家庭背景如何,接受教育都是其特权不可缺少的一部分。
For example, at replication, every user is assigned exactly the same privilege set, which implies that no fragmentation of access rights in CM is made.
例如,在复制过程中,每个用户被赋予相同的权限集,这意味着CM中不会出现有所区别的访问权限。
With the help of examples, this article highlights privilege sets and Access Control Lists (ACLs) to be granted to CM entities like users, usergroups, itemtype, item, workflow, and so on.
本文借助示例演示了权限集合和访问控制列表,并授权给 CM实体,如用户、用户组、项目类型、项目、工作流等。
Most of the rest of the policy merely is there to grant the container sufficient privilege to access bits of the system: network ports, devices, consoles, etc.
剩余的策略主要是授与容器充分的特权,以访问系统的各个部分:网络端口、设备和控制台等。
Define a transformation of access rights (ACLs, privilege sets).
定义访问权限(acl,权限集)的转换。
This provides more secure access than a traditional alternative: Run the Web server as root (!), with instances switching to the privilege of the file accessor.
与传统备选方法相比,这种方法提供了更安全的访问:以 root 的身份运行Web服务器,并提供转换到文件访问器权限的实例。
In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more.
Android系统通过这种方式实现最低权限原则(the principleofleast privilege).也就是说,每个应用在只需要完成自己的功能而不需要其他服务的时候,默认只对自己的组件有访问权限。
Give users the minimum amount of access to functions and modules that allow them to do their jobs, and take away that privilege at the earliest convenient time.
向用户提供完成其工作所需的最低功能和模块访问权限,并在不需要时尽早收回。
Still, that humble greeting marked the start of a phenomenon that has become such an important part of modern life that many experts argue access to it should be a right rather than a privilege.
尽管如此,这条谦卑的祝贺标志着一种现象的开端,它已经变成了现代生活的一个重要组成部分,许多专家认为它应该是一项权利而不是一项特权。
The important content of PMI(Privilege Management Infrastructure) and model is to realize the efficient management of authorization and access control.
PMI体系和模型的核心内容是实现授权与访问控制的有效管理。
After analyzing the access rights of the processes, this paper presents a data-protection model which will prevent the attack of the malicious processes on the base of minimal privilege principle.
基于最小特权原理,从分析进程的访问权限出发,提出了一种防御恶意程序攻击的数据保护模型。
The goal of the thesis is to develop a user privilege management system as a subsystem of MIS of special items to provide user management and access control functions.
论文的研究目标是为特种物品MIS开发一个用户权限管理系统,作为子系统为特种物品MIS提供用户管理和权限控制的功能。
The system consists of the privilege management subsystem and the access agent subsystem.
整个系统由授权管理和访问代理两个子系统组成。
Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.
借鉴基于角色的访问控制基本思想,结合开发实践,提出了一种用VJ实现用户权限管理的方法。
Role is introduced to separate user and privilege in role-based access control model, but RBAC can't directly control the permission for a sequence of events.
而基于角色的访问控制模型以角色为中介,将用户与权限逻辑隔离,但该模型不能处理有执行顺序的任务;
"The United States offers some of the world's lowest barriers to trade," said Obama. "and when we give other countries the privilege of that free and fair access, we expect it in return."
美国的贸易壁垒在全世界是最低的,我们给予其他国家的货物自由和公平的准入特权,我们希望他们也能够这样做。
Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control.
利用对象的继承特性引入细粒度权限管理的概念,把资源的控制从菜单粒度分解到原子操作粒度。
Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control.
利用对象的继承特性引入细粒度权限管理的概念,把资源的控制从菜单粒度分解到原子操作粒度。
应用推荐