impersonation

美 [ˌɪmpərsəˈneɪʃən]英 [ɪmˌpɜːsəˈneɪʃən]
  • n.冒充;模拟,扮演,假扮(角色);冒名顶替,假冒身份
impersonationimpersonation

noun

1
imitating the mannerisms of another person
Synonym: personation
2
pretending to be another person
Synonym: imposture
3
a representation of a person that is exaggerated for comic effect
Synonym: caricature imitation

数据来源:WordNet

  1. Remove impersonation parameters and use current user context instead .

    删除模拟参数并使用当前用户上下文。

  2. Gets or sets the impersonation level for the current request .

    获取或设置当前请求的模拟级别。

  3. No organization or individual may infringe name by means such as interference , misappropriation , impersonation , or the like .

    任何组织或者个人不得以干涉、盗用、假冒等方式侵害他人的姓名权或者名称权。

  4. What role is the knowledge member ( writer ) impersonation ?

    知识分子(作家)扮演什么白色?

  5. To use impersonation , the configuration must meet the requirement for delegation .

    若要使用模拟功能,配置必须满足委托的要求。

  6. The latter approach provides better performance because it avoids impersonation altogether .

    后一种方法提供的性能更佳,因为它完全避免了模拟。

  7. Do you want to remove the impersonation and use the current user context instead ?

    确实要删除模拟参数并使用当前用户上下文吗?

  8. The scope of impersonation is at the server level .

    模拟范围处于服务器级别。

  9. The impersonation identity must have sufficient privileges to create categories .

    模拟身份必须具有足够的特权才能创建类别。

  10. Impersonation failure caused by user name and password mismatch .

    因为用户名和密码不匹配,模拟失败。

  11. No security context is available to allow impersonation .

    没有安全上下文可用来允许模仿。

  12. Client Impersonation is only available for Extended Stored Procedures .

    客户端模拟仅可用于扩展的存储过程。

  13. Gets the impersonation level for the user .

    获取用户的模拟级别。

  14. This requires impersonation permissions at the server level .

    这要求在服务器级具有模拟权限。

  15. Impersonation and eavesdropping are the crucial threats in wireless communication systems .

    假冒和窃听攻击是无线通信面临的主要威胁。

  16. After establishing the correct user rights for the domain user account , configure the application identity impersonation .

    在为域用户帐户建立正确的用户权限后,需要配置应用程序标识模拟。

  17. Other authentication issues revolve around timing such as when client impersonation comes into play .

    其它在某些特定时刻引发的认证问题,如当客户端正在进行身份模拟时;

  18. Wireless authentication protocols are used to confirm identity of the participants involved in case of impersonation .

    无线认证协议用于无线环境中各参与方之间相互确定对方的真实身份,防止假冒攻击。

  19. It allows authorization data to be shared among virtual domains without the possibility of the impersonation attack .

    该协议能够使虚拟域间在不受到假冒攻击的情况下共享授权数据。

  20. No more is it his purpose to satisfy his own desire for physical transformation through impersonation .

    而通过“扮演”他者实现自己的“变身愿望”应该也不是他的内在需求。

  21. Specifies whether the session state will revert to the hosting identity or use client impersonation .

    指定会话状态将恢复为宿主标识还是使用客户端模拟。

  22. SAKA protocol does not achieve key - compromise impersonation .

    SAKA协议不具有密钥泄露安全性。

  23. In her habits , she was a living impersonation of order , method , and exactness .

    她的生活习惯活生生地体现了井井有条,按部就班和精密细致等准则。

  24. An anonymous identity cannot perform an impersonation .

    匿名标识不能执行模拟。

  25. It does so even if impersonation is disabled .

    即使禁用了模拟,它仍会这样操作。

  26. This is the impersonation / delegation model .

    这就是模拟/委派模型。

  27. Impersonation allows the thread to interact with securable objects using the client 's security context .

    模拟允许此线程与安全对象交互时用客户端的安全上下文。

  28. At present , the main threats faced by E-mail system are information eavesdropping , identity impersonation , and data modification .

    当前电子邮件系统面临的主要威胁有信息窃听、身份冒充和数据篡改等。

  29. Security for reference tracking can be provided if authentication is used and that the default impersonation level is not anonymous .

    如果使用身份验证且默认模拟级别不是匿名,则可以提供引用跟踪安全性。

  30. He did an extremely convincing impersonation of the singer .

    他模仿那位歌手惟妙惟肖。