access attribute

英 [ˈækses əˈtrɪbjuːt] 美 [ˈækses əˈtrɪbjuːt]

网络  访问属性

计算机



双语例句

  1. So, for example, to access the server attribute of the XML, you use xml.@ server. toXMLString().
    所以,如果要访问此XML的服务器属性,可以使用xml.@server.toXMLString()。
  2. You can access the keystone token that you were just issued through the auth_token attribute of the returned object, as shown in Listing 6.
    您可访问刚才通过返回的对象authtoken属性发出的keystone令牌,如清单6所示。
  3. Insure that all inbound channels not intended to allow administrative access contain a value in the MCAUSER attribute.
    确保不允许管理访问的所有入站通道都在MCAUSER属性中包括一个值。
  4. The Java language, by convention, puts a heavy emphasis on encapsulation and data hiding; thus encouraging the use of "setters" and "getters" to access otherwise private attribute data.
    Java语言通常主要关注封装和数据隐藏;因此鼓励使用“setters”和“getters”方法访问其他私有的属性数据。
  5. To access this value, call$ media-> group-> thumbnail [ 0]-> attributes(), and access the url key of the resulting attribute array.
    要访问这个值,需要调用$media->group->thumbnail[0]->attributes(),并访问结果属性数组的url键。
  6. To access this element, call SimpleXML's children() method using its namespace, and access the resulting object's average attribute to obtain the average rating.
    要访问这个元素,使用它的名称空间调用SimpleXML的children()方法,并访问对象的average属性来获取平均评分值。
  7. In a similar vein, you can access a list of related videos through the href attribute of the
    类似地,您可以通过
  8. Functions are defined which let you traverse the resulting tree any way you like, access element and attribute values, insert and delete nodes, and convert the tree back into XML.
    定义的函数允许随意遍历结果树,访问元素和属性值,插入和删除节点,以及将树转换回XML。
  9. To access the data, give the path of the attribute you want to access.
    要访问数据,请提供需要访问的属性所在的路径。
  10. Dynamic MBeans dynamically access properties using attribute accessors and invoke methods using a generalized invoke() method.
    DynamicMBean用属性访问器动态地访问属性,并用一个一般化的invoke()方法调用方法。
  11. The implementation of the access keys, with the accesskey attribute, was added to the associated links.
    使用accesskey属性在相关联的链接中实现访问键。
  12. RequisitePro can also be extended to access a requirement's attribute information.
    RequisitePro也可以被扩展以访问需求的属性信息。
  13. Access to the attribute is not permitted because the attribute is owned by the Security Accounts Manager ( SAM).
    由于该属性处于安全帐户管理器(SAM),不允许访问该属性。
  14. The Research and Realization on the Web Service Access Control Based on the Attribute in the SOA Environment
    SOA环境下基于属性的Web服务访问控制研究与实现
  15. To rename an entry, the subject must have write access to entry's entry attribute and have write access to both the old parent's and new parent's children attributes.
    要重命名条目,则必须对条目的条目属性要有写权限以及对老的父节点和新的父节点的子节点属性要有写权限。
  16. Partially trusted code that is granted access to a library with this attribute is still subject to further restrictions defined by local machine policy.
    通过此属性被授予对库访问权限的部分受信任的代码仍需要遵循本地计算机策略定义的进一步的限制。
  17. Role Based Access Control for Web Resources Using Attribute Certificate
    利用属性证书实现Web资源的角色访问控制
  18. Thirdly, the thesis introduces the definition, system infrastructure, access control model and attribute certificate of Privilege Management Infrastructure.
    第三,本文介绍了PMI体系的定义、系统结构、访问控制模型以及属性证书等相关内容。
  19. Since it is a challenge for semantic file system to get high quality attributes of files, user access patterns, which is an indirect attribute assignment method, was combined to direct attribute assignment by semantic based ASAS file system.
    针对传统语义文件系统的主要缺点,即无法得到质量较高的文件属性,利用用户访问的模式捕捉用户状态,将直接文件属性设置与间接属性设置方法结合起来,实现基于语义的ASAS文件系统;
  20. Realization of the access control based on the attribute in public key system
    基于角色的访问控制在公钥密码系统中的实现
  21. Study and Realization of Access Decision Control Function Based on PMI Attribute Certificate Privilege
    基于PMI属性证书权限的访问控制判决研究与实现
  22. The access control framework based on Role-Based Authorization expands the "session" structure of traditional operating system, appends a new conception of role, and provides HOOK function for the access control policy developers to configure the security policy attribute of role.
    基于角色定权的访问框架扩展了传统操作系统的session结构,增加角色组件,并向访问控制策略开发人员提供HOOK函数,用于设置角色的安全策略属性;
  23. Method of joining AutoCAD to Access based on attribute blocks
    基于属性块的AutoCAD与Access数据库的连接方法
  24. The configuration is based on the routing decision process, combined with the utilization of the route map and access control list to set the relative path attribute value. Then the traffic through the autonomous system is controlled.
    该配置根据BGP的路由决策进程,结合路由图和访问控制列表的使用,来设置相关的路径属性值,从而对出入自治系统的流量加以控制。
  25. All the ACs can be stored in one or more LDAP directories and client access attribute certificates through LDAP interface.
    该系统将属性证书(Acs)存储在LDAP目录中,客户系统通过LDAP接口访问属性证书。
  26. However, the current applications propose a higher request to the security of the network storage. The object-based storage storage has only provided the access control mechanism based on object attribute merely, and has not been able to consider its whole security from the system angle.
    然而,当前应用对存储网络的安全性提出了更高要求,已有的基于对象接口的网络存储系统仅仅提供了对象属性访问控制的安全机制,未能从系统的角度考虑其整体的安全性。
  27. Aiming at access control of the Web resources at present, a method of the implementation of role based access control using attribute certificate for the Web is provided.
    针对目前Web资源访问控制过程中存在的问题,提出了利用属性证书实现Web的角色访问控制方法。
  28. The system realizes RBAC ( Role-Based Access Control) model using attribute certificate, and implements different users 'login with centralized authentication and SSO ( single sign-on) technology.
    该系统使用属性证书实现了基于角色的访问控制,对用户的登录采用集中的身份认证和单点登录技术,能兼容不同的认证方式和认证设备。
  29. Attribute authority is responsible for granting, querying, updating and revoking vistors 'permission. Privacy authority is responsible for defining and maintaining activation rules and making access decision. Attribute query component is responsible for querying activation conditions.
    属性权威负责用户权限的授予、查询、更新、撤销等操作;隐私权威负责激活规则的制定维护和访问判决;属性查询组件负责查询用于判决的激活条件。
  30. The second discusses the rough concept lattice of the rules of access to decision-making methods and attribute reduction.
    第二、讨论了粗糙概念格的决策规则获取方法和属性约简等问题。