Programs must sometimes enforce their own access control requirements on resources they are responsible for and on user accounts not recognized by the operating system.
对于所负责的资源和操作系统无法识别的用户帐户,程序有时必须强制实施它们自己的访问控制要求。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
The system should provide mechanisms to authenticate users with user data residing in the on-premise environment, and authorize with access control data residing in an on-demand environment.
系统应该提供相应的机制,以便使用自行管理环境中的用户数据对用户进行身份验证,并使用按需环境中的访问控制数据进行授权。
The root user can control every process, access every file, and perform any function on the system.
root用户可以控制所有的程序,访问所有文件,使用系统上的所有功能。
Using sugroups enables system administrators to control access to individual user accounts by group membership.
使用sugroup 让系统管理员能够通过组成员关系控制对各个用户账户的访问。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control.
本章描述了ASP和网络化制造系统的安全性问题,尤其是用户访问控制的问题;
The system realizes the access control based on ACL, support dynamic configuration and manage about department, user, group and access authority.
系统实现了基于ACL的访问控制,支持部门、用户、群组及用户访问权限的动态配置与管理。
At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.
最后,在方案设计基础上实现本认证与访问控制系统,结合RADIUS认证服务器构建实验系统平台。
The goal of the thesis is to develop a user privilege management system as a subsystem of MIS of special items to provide user management and access control functions.
论文的研究目标是为特种物品MIS开发一个用户权限管理系统,作为子系统为特种物品MIS提供用户管理和权限控制的功能。
It explains a user role mapping (URM) method, designs and implements a rule engine which has been adopted by a real access control system.
描述了一种用户角色映射(urm)的方法,设计实现一种规则引擎,并将其应用于实际访问控制系统。
To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.
为保护用户数据、系统资源不被非法访问和滥用,现代文件系统设立了文件访问控制、数据加密等各种安全机制。
The network Auditing System usually used to implement the user authentication, access control, log recording and other functions such as flow charge in a large network.
网络审计系统广泛应用于园区网络,实现园区网络内的身份认证、访问控制、日志记录以及流量计费等功能。
Access control is an important technology that is used to protect system resources from unauthorized user access, change, destruction.
访问控制是用来保护系统资源免于被非法用户访问、更改、破坏的一项重要技术。
The access control equipment and the remote control software in this system achieve SIP user agent function, and thereby providing the ability to access SIP system.
系统中接入控制设备和远程控制软件实现SIP用户代理功能,从而提供接入SIP系统的能力。
After debugging and testing, this embedded Access Control system work well and stably, and meets the project requirements. Now it has been delivered to user.
经过调试和测试,该产品工作正常稳定,满足设计需求,已交付客户使用。
After debugging and testing, this embedded Access Control system work well and stably, and meets the project requirements. Now it has been delivered to user.
经过调试和测试,该产品工作正常稳定,满足设计需求,已交付客户使用。
应用推荐