• This is the interface used for representing one entry in an Access Control List (ACL).

    接口用来表示访问控制列表中(acl)的一个入口

    youdao

  • An access control list is a list of permissions or sets of permissions securing a resource.

    访问控制列表权限列表保护资源权限

    youdao

  • C. Modification road by implement access control list, prohibit be being visited illegally.

    修改路由器存取控制列表禁止非法访问

    youdao

  • One method to satisfy the access authority on file access is to implement an access control list (ACL).

    文件访问进行访问授权方法实现访问控制列表 (ACL)。

    youdao

  • For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.

    有关更多信息请参见如何添加移除访问控制列表ACL技术概述

    youdao

  • The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.

    acl访问控制列表文件位于 KDC主机,它控制Kerberos数据库的访问。

    youdao

  • Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.

    访问控制列表(acl)具有所有者索引列表散列对象如图2所示。

    youdao

  • The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.

    下面所示的访问控制列表文件允许具有admin实例所有主体领域VMKRB5进行全面访问。

    youdao

  • Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL).

    提供访问控制列表 (ACL)中的访问控制ACE能力

    youdao

  • For this example, use the access Manager access control list (ACL) to manage the ObjectGrid authorization policies.

    对于示例,请使用AccessManager访问控制列表(Access Control List,ACL)管理ObjectGrid授权策略

    youdao

  • Access control list can be used to filter away dangerous packets and give some level of protection to the network.

    访问控制列表能够过滤网络中的有害报文网络提供相对安全保护

    youdao

  • Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.

    尽管这个文件 ACL (Access Control List) 保护,允许根用户访问但是这对于安全性要求的系统可能不够

    youdao

  • An administrator can also assign an access control list to each work node for additional security control at the work node level.

    管理员可以每个工作节点分配访问控制列表进一步工作节点级别上进行安全控制。

    youdao

  • A sophisticated ACL (Access Control List) is used to ensure that the appropriate user is mapped to the desired information.

    复杂而精密的ACL(访问控制列表)用于确保适合用户映射到所需要的信息。

    youdao

  • Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.

    访问控制列表(acl): ACL数据结构将一个服务权限列表与一主体相关联。

    youdao

  • The server can impersonate the client for access control list (ACL) checking, but it cannot access system objects as the client.

    服务器可以模拟客户以进行访问控制列表(acl)检查但是无法作为客户端访问系统对象

    youdao

  • Adds the specified access control list (ACL) permission to the current file or directory and removes all matching ACL permissions.

    重置对当前文件目录指定访问控制列表(acl)权限

    youdao

  • The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.

    门户管理可以管理访问控制列表 (ACL),以便门户确定角色权限映射

    youdao

  • Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.

    更新数据库domforint . nsf访问控制列表(acl),防止匿名访问以及用户授权相应角色

    youdao

  • Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.

    AccessManager创建一些测试对象用户受保护资源然后添加访问控制列表策略

    youdao

  • If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.

    如果存在必须相应地使用文件系统中的代码访问安全机制访问控制列表来保护包含这些文件目录

    youdao

  • If you deselect the All Users option in the Page Access dialog box, it lists everyone who has a role defined in the composite application's Access Control list.

    如果PageAccess对话框中取消选择all User选项会列出复合应用程序Access Control List定义过角色的所有用户

    youdao

  • The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.

    管理员配置分配每个过程访问控制列表这样存在定义过程能够什么的业务控制。

    youdao

  • This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析了访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    youdao

  • Fine-granularity discretionary access control based on Access Control List (ACL) may grant authority to one user or group, but it may grant unapt authority or remove authority not timely.

    基于访问控制ACL)的细粒度自主访问控制机制可以实现针对单个用户用户的访问授权但是在实际使用中可能造成适当授权或权限撤销不及时的缺陷。

    youdao

  • On the Basics tab of the File Protection document, accept the default options and modify the access control list to make sure that the domino/html/web2.0 directory is specified as the Path.

    FileProtection文档Basics附签上,接受默认选项修改access control列表确保domino/html/web2.0目录指定Path

    youdao

  • In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.

    无线网络中,攻击可以修改自己无线网卡的MAC地址合法站点的地址,从而可以绕过访问控制列表窃取网络信息,给无线网络安全带来很大的危害。

    youdao

  • Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.

    目前国内设备生产厂商中,能够生产骨干网络交换机的厂商为数不多,所以,在骨干层网络交换机上的访问控制列表技术在国内处于领先地位的。

    youdao

  • The places list for the logged-in user's access control is displayed in figure 4.

    4显示了已登录用户具有访问控制权限位置列表

    youdao

  • The places list for the logged-in user's access control is displayed in figure 4.

    4显示了已登录用户具有访问控制权限位置列表

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定