PKI技术能够提供身份鉴别和角色控制服务。
PKI can provide identity authentication and role access control service.
企业百科全书是拥有基于角色控制以及实例层次控制的数据库。
Enterprise encyclopedias are databases that have role-based access control and instance-level access control.
可以使用测试设置中的角色控制给定测试运行的代理选择。
You can control agent selection for a given test run by using roles in test settings.
类似地,还可以根据角色控制对收费服务的访问,以确保对服务的适当使用。
Similarly, access to fee-based services can also be controlled based on roles to ensure proper use of services.
详细介绍并讨论基于角色控制的数据库模型和API模型的实现方法。
Detailed discussion is given regarding the implementation of models of RBAC database and API.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
现在我们正在尽力使星际争霸:幽灵的质量达到暴雪角色控制游戏的要求,随着它的出版日期日益临近,我们可以知道它能达到一个什么样的高度。
Right now, we're wholly focused on making StarCraft: Ghost into a Blizzard-quality console game, and we will have a better idea of what rating it will receive as we get closer to release.
电影公司可以通过让演员无角色可演或其他途径控制他们的生活,以惩罚他们。
The studio could punish its players by keeping them out of work, and otherwise controlling their lives.
由于蚂蚁在行为上扮演着积极的角色,它们培育和控制被动真菌的说法似乎很有说服力。
Because the ants play the behaviorally active role, it seems compelling to say that they cultivate and control the passive fungi.
人工任务角色分配是高度动态的且需要版本控制。
The human task role assignment is highly dynamic and requires version control.
操作者能直接控制角色吗?
仪表板还提供了对于访问控制警报、操作和用户角色的支持。
Also available from the dashboard are support for alerts, operations, and user roles for access control.
然而,当创建虚拟门户时存在些微的变化,因为相应的配置任务在虚拟门户中没有创建任何内容或存取控制角色。
However, there are slight changes when creating a virtual portal, because the corresponding configuration task does not create any content or access control roles within the new virtual portal.
数据库安全管理员对角色从属关系有严密的控制。
The database security administrator has tight control on the role membership.
按游戏界的行话,《荣誉勋章》是第一人称射击游戏,意思是玩家从他们控制的角色的视点进行游戏。
In the argot of video games, Medal of Honor is a first-person shooter, meaning that players see the action from the viewpoint of the characters they control.
角色决定用户的访问控制。
但是,如同任何父母与子女的关系一样,所有爱的意图都会受到控制,角色转换,犯罪和轻微欺骗这些问题的考验。
But, as with any parent-child relationship, all loving intentions can be tempered by issues of control, role-reversal, guilt and a little deception - enough loaded stuff to fill a psychology syllabus.
它建立在决策权和管理框架的基础上,此框架为SOA生命周期的四个阶段建立了权限、角色、控制等链条。
It is based on a decision rights and management framework that includes the establishment of chains of authority, roles, controls, and so forth, for the four phases of the SOA life cycle.
其中的每个应用程序角色都聚合一组非常特定的门户访问控制角色。
Each of these application roles aggregates a set of very specific portal access control roles.
但是,从长远角度看,他认为这套系统可以在诸如《第二人生》等多人虚拟世界中控制游戏角色。
In the longer term, though, he thinks the system will be ideal for controlling avatars (the visual representations of players) in multiplayer virtual worlds such as Second Life.
网关组件为服务路由、协议转换以及安全担当着中央控制点的角色。
The gateway component acts as a central control point for service routing, protocol transformation, and security.
您可以对各个组件隐藏许多访问控制角色的复杂性,并使用易于理解和方便使用的名称将它们公开为少数几个简单的应用程序级别角色。
You can hide the complexity of many access control roles to individual components and expose them as few simplified application level roles with well-understood and easy to use names.
授权的目的是对每个ID、每个角色、或者每个概要进行访问控制。
The purpose of authorization is to control access to resources on a per-ID, per-role, or per-profile basis.
定义角色和提供访问控制。
图1:一个新的服务创建项目的社区、角色和访问控制。
Figure 1: Sample communities, roles, and access controls for a new service creation project.
布局角色和策略组以控制授权。
执行xml脚本后,管理portlet将这些存取控制角色应用到已创建的内容中。
After the XML script executes, the administration portlet applies these access control roles to the created content.
在AIX 6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
例如,您可以选择不同的角色来控制In - basket小部件,以显示不同的收文篮。
For example, you can select different roles to control the in-basket widget to show different in-baskets.
应用推荐