下面是此虚拟校园应用程序的授权模型。
Here is the authorization model for this virtual campus application.
您需要的是比较简单的、更具表达力的强大授权模型。
What you need is a more powerful model of authorization that is more expressive without being unduly complex.
示例授权模型非常简单,它只定义单个权限,即登录权限。
The example authorization model is very simple in that it only defines a single permission, the entry permission.
Usergrid的API实现了oAuth 2.0的授权模型。
Usergrid's API implements an oAuth 2.0 authentication model.
V 4符合J2EE 1.2基于安全性角色而不是方法组的授权模型。
V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.
人们已经提出了一些授权模型,以保证计算机系统的信息安全。
Many authorization models have been proposed to ensure information security of computer systems.
通过引入授权和可变属性,使用控制授权模型具有了新的特性。
After importing authorization and mutable attribute, the usage control authorization model is characterized with a new feature.
存在这样一个区域,其中细粒度授权模型是普遍存在的和众所周知的:即操作系统。
There is one area where fine-grained authorization models are ubiquitous and well-understood: the operating system.
在以用户为中心的授权模型的基础上,提出了授权管理器的授权层次模型。
Based on the authentication model for user, the multilayer - authentication model of authentication manager was advocated.
在此临时授权模型基础之上,我们详细讨论了XML访问控制的若干技术问题。
Based on this provisional authorization model, several problems of XML access control technology are discussed in detail.
静态SQL能够提供更加一致或者甚至更好的性能,以及更好的DB 2应用程序授权模型。
Static SQL can provide more consistent or even better performance and a better authorization model for DB2 applications.
WebSphereCommerce应用程序的授权模型有三个主要概念:用户、操作和资源。
The authorization model of a WebSphere Commerce application has three primary concepts: users, actions, and resources.
门户域中的访问控制没有基于J2EE授权模型,因为它不够强大,不足以成为可行的门户授权域解决方案。
Access control within the portal domain is not based on the J2EE authorization model, because it is not powerful enough to be a viable solution for the portal authorization domain.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
本文将继续介绍虚拟校园场景,用于对本系列前面的文章进行阐述,说明如何通过EAz实现复杂的授权模型。
This article continues with the virtual campus scenario, used to illustrate the earlier articles in the series, to show how a complex authorization model can be implemented through EAz.
总之,ACL的范围至少是它保护的资源,不过,应用程序可以扩展该范围,以实现设计人员所需的授权模型。
To sum up, the scope of an ACL is at least the resource it secures, however the scope can be extended by an application in order to implement a designer's desired authorization model.
在动态构建服务网格虚拟组织以协同问题求解的新趋势下,提出了一种服务网格工作流委托授权模型。
Under trend of dynamically constructing service grid virtual organization to solve coordinated work question, a delegation authorization model for service grid workflow is proposed.
分析ISO10181访问控制框架与权限管理基础设施PMI,提出了跨信任域的授权模型CTRA。
The ISO10181 access control framework and the Privilege Management Infrastructure PMI are analyzed, and a Cross Trust Regions Authorization Framework(CTRA) is designed.
基于角色的委托授权模型旨在解决传统授权管理的集中性和复杂性问题,从而满足分布式计算环境的需求。
Role-Based Delegation Model mainly solves the centralization and complexity questions of traditional authorization management, and satisfies the requirement of distributed computing environment.
从身份认证和访问控制入手,结合PKI和RBAC技术,提出了一种针对电子病历的基于身份的授权模型。
An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.
我介绍了JAAS授权模型中的一个矛盾之处,并描述了一种解决它的实用方法,并提供了它的现实世界实现的一个例子。
I've documented a discrepancy in the JAAS authorization model and also described a practical workaround, offering a real-world implementation as its example.
我还不知道它们将是什么样子,但是我知道,如果我们将它们简单视为队列授权模型的扩展,则该“最佳”实践将是错误的。
I do not know yet what they will look like, but I do know that if we treat them as nothing more than extensions of the queue authorization model, the "best" practice will be wrong.
针对工作流系统中用户由于某些原因不能按时完成所分配任务的情况,提出了基于角色层次的任务转授权模型。
To adapt to the situation that a user could not complete the assigned task in time, a role-hierarchy-based task delegation model in workflow is proposed.
构建了一个带有时间约束的基于角色的工作流系统授权模型,分析该模型对最小权限和责任分离要求的满足情况。
And a WFMS authorization model based on role control and time constraints is constructed, and how it meets the desires of least privilege and separation of duty is discussed.
这个模型将篡改授权数据的风险降至了最低,因此服务器不用花费大量的时间来验证数据了。
The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.
由企业安全模型定义的授权。
单模型还限制授权用户只能查看自己的数据视图,这也有助于您遵守数据治理和隐私法规。
The single model also restricts authorized users to only their view of the data, which may also help you comply with data governance and privacy regulations.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
文中还介绍了DB 2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
文中还介绍了DB 2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
应用推荐