It should not be used as an insecure form of access authorization.
不要将其用作一种不安全的访问授权形式。
Log in to enter credentials for authentication and account access authorization.
登录以输入认证和帐户访问授权的凭证。
Any further access authorization is performed by NTFS file access permission's URL authorization.
任何进一步的存取授权将由NTFS档案存取使用权限的URL授权来执行。
The system achieves identity authentication, access authorization, and accounting management to the remote access users.
该系统实现了远程访问用户的安全认证、访问授权和记费管理。
The game server can check authorization and control access to the media.
游戏服务器可以检查授权并控制对媒体的访问。
The access decision manager is responsible for making authorization decisions.
这个访问决策管理器负责制定授权决策。
Most of the current systems implement access control and authorization in a proprietary manner.
目前多数系统都以专有的方式实现访问控制和授权。
XACML is an initiative to develop a standard for access control and authorization systems.
XACML的初衷是开发一项访问控制和授权系统的标准。
Data access services: These services are responsible for authorization, restrictions and logging access to data.
数据访问服务:这些服务负责数据访问授权、限制和日志记录。
Interceptors use your application's access control policy to make authorization decisions.
拦截器使用应用程序的访问控制策略来做出授权决定。
The concept of an access token is very similar to label-based authorization controls.
访问标志的概念非常类似于基于标签的授权控制。
Authorization and access control can vary from coarse - to fine-grained.
授权和访问控制的粒度粗细不等。
Authorization decision: Authorization decision assertion manages a given subject's authority to access resources.
授权决策:授权决策断言管理给定主体访问资源的权限。
RUNSTATS authorization and user access.
包含授权和用户访问的runstats。
Acegi again executes its authorization process to access the beans.
Acegi再次执行对访问bean的授权过程。
Second, an authorization mechanism is used to control access to application functionality.
其次,使用授权机制来控制对应用程序功能的访问。
The authorization table might also contain an external access ID.
授权表也可能包含外部访问ID。
After the authorization process, the client receives an access token.
授权过程后,客户端收到一个访问令牌。
Under the authorization of us, any person can have access to our detailed information.
有了我们的授权,任何人都能够看到他人的详细信息。
Authorization constraint is an important part in role-based access control models.
授权约束是基于角色的访问控制模型中一个非常重要的部分。
In this paper, authorization and access control was equal.
本文中授权和访问控制是等同的。
A remote access dial in user service (RADIUS) authentication, authorization and account system is constructed.
构建了基于远程访问拨号接入用户服务(RADIUS)的认证、授权和计费系统。
Authorization helps to control what the user can or cannot access.
授权方式帮助控制用户可以访问或不能访问的内容。
Prevention of access to, or use of, data or programs without authorization.
防止未经许可去访问或使用数据或程序的一种指标。
Some security threats exist in file services of data center, such as access without authorization.
数据中心内的文件服务存在未授权访问等安全威胁。
Access to records and data without appropriate management authorization are strictly prohibited.
凡未经管理层正式授权的人士,不得取用记录及数据。
Checks authorization for the given operation context when access to a message is required.
访问所需的消息时,检查给定操作上下文的授权。
Checks authorization for the given operation context when access to a message is required.
访问所需的消息时,检查给定操作上下文的授权。
应用推荐