Примеры использования Access control lists на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
protocols, and access control lists).
HP-UX was the first Unix to offer access control lists for file access permissions as an alternative to the standard Unix permissions system.
As with all objects in the directory, access control lists(ACLs) protect schema objects, so that only authorized users can alter the schema.
ReFS supports many existing Windows and NTFS features such as BitLocker encryption, Access Control Lists, USN Journal,
and implements access control lists on directories for users and groups.
If you installed a new Configuration Manager 2007 site server, a site reset sets the access control lists back to the original settings.
such as firewalls and access control lists(ACLs), for better information protection by locking the usage rights within the document itself,
which allows access control lists merely as a means to decide on the acceptance of frames according to their(presumed) source.
like variable size cache and Access Control Lists, and was available only in OS/2 3.0 server edition.
directories it owns or for necessary system files(restricted via file system permissions, access control lists, chroot, jailshell, etc.).
RBAC differs from access control lists(ACLs), used in traditional discretionary access-control systems,
these groups of devices can be specified in access control lists.
The default access control lists(ACLs) on earlier versions of Windows that granted the Everyone group access to resources,
In addition, the Access Control List(ACL) feature enhances network security
In addition, the Access Control List(ACL) enhances network security and performance.
The IMAP4 Access Control List(ACL) Extension(RFC 4314) may be used to regulate access rights.
The access control list contains the ACL information for the file.
The PRP acts as an access control list(ACL).
Access control list(ACL).
Open the Access Control List Editor.