角色之间的冲突通常被刻画为角色彼此不友好,或者他们可能对彼此使用情感攻击策略。
Conflict between characters is often depicted with characters being unkind to each other or they may use emotionally aggressive tactics with each other.
事实证明,把电视角色印在午餐盒上是一种有效的营销策略。
Putting TV characters on lunch boxes proved an effective marketing strategy.
图4展示了角色、工具,以及当实现策略的时候每种角色所操作的具体行为。
Figure 4 shows the roles, tools, and the specific activities conducted by each role while implementing the policies.
除了默认角色,每个多维数据集还有一个默认策略。
In addition to the default role, each cube has a default policy.
默认角色和默认策略共同构成默认授权:多维数据集上针对没有显式访问规则的用户的隐式访问规则。
Together, the default role and default policy make up the default authorization: the implicit rule of access on the cube for users with no explicit rule of access.
信息必须根据客户的角色按照确立的策略进行加密和以保密方式进行维护。
Information must be encrypted and privacy maintained in accordance with established policies, according to the role of the consumer.
通过安全策略,用户被授权访问项目,他们的活动是通过他们的角色定义的。
Users are granted access to projects through Security policies, and their actions are defined by their Role.
这势必会引入一个新的组织角色,其工作是加强策略中所制定的流程以及合规特征的执行。
This introduces the need for a new organizational role that is tasked with enforcing the processes and syntactical characteristics that are defined as part of the strategy.
侧重讨论使用资产商店、角色、策略组、契约、买方和卖方组织结构的商店布局。
It focuses on store layout using asset stores, roles, policy groups, contracts, and buyer and seller organizational structures.
现在可以使用新的角色来构建业务策略和断言了。
The new roles are now available for building business policies and assertions.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
分配给用户的角色可以用在定制安全策略的设计和实现中,以及定制的工作流和事件升级流中。
Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.
不存在用于与其他服务和数据交互的达成一致的安全标准,并且没有用于策略管理的已定义的角色和职责。
There are no agreed-upon security standards for interacting with other services and data, and no defined roles and responsibilities for policy administration.
第三个因素是各种用户角色需要基于规则的访问,包括非技术性策略分析师。
A third factor is role-based access for a variety of user roles, including non-technical policy analysts.
图5:安全策略提供访问权限,角色定义允许操作。
Figure 5: Security Polices provide access, and Roles define Allowed Actions.
它们将已建立的一系列任务、决策、对数据对象的引用、策略、角色及测试合并起来。
They incorporate established series of tasks and decisions, references to data objects, policies, roles, and measurements.
某个角色没人担任或让某个人担任太多角色是常见的策略错误。
It is usually a strategic mistake to leave roles unfilled or to have one person filling too many roles.
您的角色不仅仅是确保自己遵循所有的治理策略和流程。
Your role isn't just to make sure that you conform to all the governance policies and processes.
现在隐私模型已建立,我们将在源代码中定义隐私策略并应用到不同的角色类型上。
Now that the privacy model has been set up, we need to define privacy policies applying to the role types in a way that works with our source code.
Aspect在抓取策略实现上扮演着重要角色。
Aspect plays a very important role in fetching strategy implementation.
布局角色和策略组以控制授权。
这些组和角色可用于一些安全性策略,比如针对IBMCognos8门户中的每个对象的访问权限。
These groups and roles can be used in Security policies such as access permission for each object within the IBM Cognos 8 portal.
您可以在 Authorizations选项卡上对角色分配策略。
通过示例介绍了如何启用WebSphereApplicationServer中的安全特性,如何用LDAP给用户分配安全角色,以及如何定义安全策略。
It gave examples on how to enable security in WebSphere Application Server, how to assign users to security roles with LDAP, and how to define security policies.
通用请求处理:esbGateway在实施通用的(并且理想状况下)基于策略的请求处理方面扮演着特定的角色。
Common request handling: the ESB Gateway has a specific role in enforcing generic, and ideally, policy-based handling of requests by the ESB Gateway.
创建Fabric核心模型涉及到在Software Architect中创建新的uml模型,其中包含诸如通道、角色和策略断言等Fabric元素。
Creating a Fabric core model involves creating a new UML model in Software Architect that contains Fabric elements like channels, roles and policy assertions.
Authorization——资源、角色和策略之间的联系。
Authorization - an association among a resource, role, and policy.
如果没有为allowedMembers指定表达式,那么将认为该维度的所有成员都可以被分配了策略的角色访问。
If you do not specify an expression for Allowed members, all members of the dimension are considered to be accessible by a role that is assigned the policy.
建立度量、策略和控制机制,以支持各个人员执行各自的角色任务和履行相关职责。
Establishing measurement, policy, and control mechanisms to enable people to carry out their roles and responsibilities.
围绕用户角色创建业务策略是非常普遍的做法,在Fabric的概念验证和技术演示过程中尤其是如此。
It's common, especially during proof of concepts and technical demonstrations of Fabric, to create business policies around user roles.
应用推荐