访问权限
- 与 访问权限 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The remote user will be identified with his IP-Address, and will be given access with that address only.
远程用户将会通过其 IP 地址进行确认,而且只有通过这个地址才有权限进行访问。
-
It includes the security problems resulted from excessive root privilege, the excessive authorization problem resulted from SetUID and SetGID, the Trojan horse problem resulted from discretionary access control, and the buffer overflow problem endemic to C programs.
第一,全面深入地分析了Linux操作系统现存的安全问题,包括root权限过大引起的安全问题,SetUID和SetGID带来的过度授权问题,自主访问控制可能引起的特洛伊木马问题,以及C语言内在缺陷所引起的缓冲区溢出问题。
-
NET technology to carry out visit on the data base under the environment , has distributed and rationally being unlike consumer sigmatism extent of authority.
NET 技术对数据库进行访问,并合理地分配了不同用户的使用权限。
-
Also, if you have to allow access from an untrusted machine, anyone there can compromise your display.
还有, 如果您允许了一台不被信任的机器访问,那么其上任何用户都可获得权限。
-
The cores of access control base on role are user, role, privilege and relationship between them.
基于角色的访问控制的核心是用户、角色和权限以及它们之间的关系。
-
Thesystem development to Delphi7.0 front end took the development kit,2,000 has carried on the development practice take SQL Server as thebackstage database and the ADO database visit technology, this systemrealized under the onstage processing function visitor registration,the registration revised, prearranges processing, the visitor tradesthe room, the visitor continues, the visitor returns a house, thevisitor ties the account guest room operation and the inquiry service,manager inquires, function and so on guest room establishment, userand jurisdiction, system maintenance.
系统开发以Delphi7.0作为前端开发工具,以SQL Server 2000为后台数据库和ADO数据库访问技术进行了开发实践,该系统实现了前台处理功能下的客人登记、登记修改、预定处理、客人换房、客人续住、客人退房、客人结账客房操作及查询业务、经理查询、客房设置、用户与权限、系统维护等功能。
-
Basing the ideal model and characteristics of campus network, we propose a predigesting model of campus web information portal.
校园网 Web 信息门户的简化模型由统一认证服务、应用管理服务和门户视图管理三部分组成,实现了 Web 信息门户的三个特征:统一认证服务通过口令认证服务和票据服务实现了单点登录应用漫游;应用管理服务通过应用系统管理和用户权限管理实现了 Web 应用系统的集中管理和集成服务;门户视图管理实现了个性化的访问环境。
-
Extended logic programs without functions are introduced to represent the diverse access control policies, and the propagation depth and direction of privileges along the entity hierarchy can be constrained. After privilege conflicts are resolved according to the rules based on priority between different grantors and entities, semantics as answer sets of extended logic programs is attained.
采用类似于无函数的扩展逻辑程序的表示方法对安全访问策略进行描述,限定权限传播的深度,利用不同的优先次序定义了多种消解冲突的规则,并给出了类似扩展逻辑程序的回答集语义解释。
-
What's more, with fundamental research, the following solutions were put forward: Database connectivity technology, Which can help to implement this system which works in Client/Sever mode; the method of directly giving the Database system's operating purviews to right users with the application of DBMS' s authentication mechanism, which help to control Database's access; And also has set up user's password and managed the subsystem, in order to ensure the safety of database Formulation ,typing of the report form and connection technology of the database.
这些关键技术包括数据库连接技术,以实现客户/服务器模式下的数据库开发;结合数据库管理系统的自身鉴别机制,将数据库的权限赋予用户,以控制用户对数据的访问,并设置了用户密码管理子系统,以确保数据库的安全。还有报表的生成、打印及其与数据库的连接技术。
-
Q Home directory IIS perms: Enable Read and Log.
主目录的IIS权限:启用&读取&和&记录访问&。
- 推荐网络例句
-
They weren't aggressive, but I yelled and threw a rock in their direction to get them off the trail and away from me, just in case.
他们没有侵略性,但我大喊,并在他们的方向扔石头让他们过的线索,远离我,以防万一。
-
In slot 2 in your bag put wrapping paper, quantity does not matter in this case.
在你的书包里槽2把包装纸、数量无关紧要。
-
Store this product in a sealed, lightproof, dry and cool place.
密封,遮光,置阴凉干燥处。