Examples of using Control lists in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
With a view to implementing this resolution, Paraguay will make the necessary efforts to develop the relevant national control lists.
For example, access control lists(ACLs) are a superset of firewall rules.
In June 2011, Kazakhstan announced the adoption of an export control act containing control lists, to reinforce the weapons of mass destruction nonproliferation regime.
Therefore, the access control lists, rule bases and other configuration parameters may need to be reevaluated and translated to support an IPv6 environment.
As Chair of the Australia Group we work with 40 other countries and the European Community to harmonize and strengthen chemical and biological export control lists.
The Network Configuration Manager will help you update and audit its access control lists and give you virtual defense context support for parent/child relationships.
The PSI is not a stand-alone initiative. Instead, it complements such international efforts as Security Council resolutions, existing treaties and control lists.
POSIX® has released a working draft that adds event auditing, access control lists, fine grained privileges, information labeling, and mandatory access control. .
For MySQL database users, the remote access is controlled by MySQL native security mechanism- access control lists(ACL).
Permissions to interact with local and remote server COM objects are specified by access control lists(ACL) in the Registry.
Those were the early days of the internet, and back then the prominent firewall technology was stateless access control lists(ACLs).
Extensive access control lists(ACLs) to restrict sensitive portions of the network from unauthorized users and guard against network attacks.
Of note were refinements to export control lists, including the addition of specific aerosol sprayers suitable for dispersal of biological agents.
In this regard it was recognized that export control lists are used in promoting the implementation of resolution 1540(2004).
Extensive access control lists(ACLs) restrict sensitive portions of the network to keep out unauthorized users and guard against network attacks.
These control lists contain all items classified as worthy of control in the international export control regimes, the competent European Union bodies and the Federal Government.
The control lists of such regimes have been incorporated into Council Regulation(EC) 1334/2000 relating to dual-use goods and technology, which is applicable in Luxembourg.
The first use of the new extended attribute subsystem is to implement POSIX access control lists.
On the Hadoop/Spark side, we have only role-based, limited access control lists(ACLs) or the Wild West.
Source code cloning, development, and review are under ACL(Access Control Lists).