داستان آبیدیک

access control list


فارسی

1 کامپیوتر و شبکه:: لیست کنترل دسترسی، لیست کنترل دسترسی

GetAccessControl Gets a FileSecurity object that encapsulates the access control list (ACL) entries for a specified file.،This representation is called an access control list or ACL. There are advantages and disadvantages to both the C-List and ACL representations of protection states. For the ACL approach, the set of subjects and the operations that they can perform are stored with the objects, making it easy to tell which subjects can access an object at any time. The systems in use today, see Chapter 4, use ACL representations, but there are several systems that use C-Lists, as described in Chapter 10. Recall from Chapter 2 that Lampson's access matrix [176] identified two views of an access control policy: (1) an object-centric view, called access control lists, where the policy is defined in terms of which subjects can access a particular object (the columns of the matrix) and (2) a subject-centric view, called capabilities, where the policy is defined in terms of which objects can be accessed by a particular subject (the rows in the matrix).

واژگان شبکه مترجمین ایران


معنی‌های پیشنهادی کاربران

نام و نام خانوادگی
شماره تلفن همراه
متن معنی یا پیشنهاد شما
Captcha Code