Examples of using Control lists in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Access Control Lists.
Updating Australia Group control lists.
Access Control Lists.
Control lists are updated regularly by the Ministry of Economy, Trade, and Industry.
Access Control Lists.
People also translate
Control lists of the above regimes are incorporated in the relevant national regulations.
Set Access Control Lists.
The products and technologies for which such permission isrequired are specified in specific export control lists.
Windows Access Control Lists.
If you are using Access Control Lists to control access to your objects, the user should have Reader access.
Windows Access Control Lists.
All strategic goods control lists are continuously updated subject to the decisions adopted within the international non-proliferation regimes and the EU.
Flexible national control lists;
MySQL uses security based on Access Control Lists(ACLs) for all connections, queries, and other operations that users can attempt to perform.
In addition,some States exercise jurisdiction over items not specified on control lists, but which might contribute to proliferation.
In addition to national export control lists, control lists developed under those regimes are also applied by the portuguese export control system.
Exploitation of information received from the Australia and Nuclear Suppliers Groups and control of dual--use goods of the AG and NSG control lists.
As such, Pakistan' s national control lists include the items covered by documents S/2006/814 and S/2006/815.
Norway considers these instruments to be very important,particularly since they play a significant role in drawing up agreed control lists and raising international export control standards.
Licensing: building control lists, licensing procedures and practices, as well as teaching knowledge, skills, and abilities related to implementation.
For example,our file APIs include support for Windows Access Control Lists(ACL) which can't be supported in all environments.
The permanently up-dated control lists agreed by these regimes are incorporated into the Annexes of the EU dual-use regulation, which is directly applicable in Austria.
With RBAC, you don't need to modify and manage access control lists(ACLs), which was done in Exchange Server 2007.
The control lists of these regimes are implemented through the European Union Regulation on control of exports of dual-use items and technology and the Danish Weapons Act.
Release 4.2 added support for the Veritas filesystem, access control lists(ACLs), and dynamically loadable kernel modules.
Security MySQL implements security based on Access Control Lists(ACLs) for all connections, queries, and other operations that a user may attempt to perform.
At this time, Active Directory-based authentication and access control lists(ACLs) are not supported, but they will be at some time in the future.
The excluded policy types include resource-based policies,access control lists, AWS Organizations policies, IAM permissions boundaries, and session policies.
These other policy types include resource-based policies,access control lists, AWS Organizations policies, IAM permissions boundaries, and AWS STS assume role policies.
Recognizes the utility in implementing this resolution of effective national control lists and calls upon all Member States, when necessary, to pursue at the earliest opportunity the development of such lists. .

