此外还引入了访问上下文栈来支持视图和存储过程这类的受控访问机制。
In addition, MSDA adopts access context stack to support controlled access mechanisms such as views and stored procedures.
RationalClearCase是为跨整个生命周期的软件资产的受控访问提供设计、开发、构建、测试,及部署工具的集成的全面的解决方案。
Rational ClearCase is a comprehensive solution that provides integration with design, development, build, test, and deployment tools for controlled access to software assets across the full lifecycle.
MSDA主要解决了多策略框架对细粒度访问控制和受控访问机制支持不足的问题,并把体系结构实施对原有系统结构和对系统性能的影响控制在较小的范围内。
MSDA not only solves the problem of fine-grained access control and controlled access mechanisms, but also minimizes the influence on the original system structure and system performance.
缺点在于,如果联合被破坏,很少有防护措施来防止未经授权的用户获得对受控信息的访问。
The disadvantage is that if the federation is corrupted, few safeguards prevent an unauthorized user from gaining access to controlled information.
出站请求:与前一个条目类似;内部用户怎样访问受控环境中的外部服务?
Outbound Requests: Similar to the previous entry; how can internal users get access to outside services in a controlled environment?
这些新的工作人员还将与受感染市内访问社区的小组相结合,以便改进公众对该病的了解和接受控制措施。
The new staff will also join teams visiting communities within the affected municipalities in order to improve public understanding of the disease and acceptance of control measures.
集中存储库允许所有团队成员受控地访问资源,并且它给每个人呈现的项目都是一致的。
The central repository allows controlled access to the materials for all team members, and it presents a consistent view of the project to everyone.
当需要从一台系统已经 “死亡” 的机器上导出资料时,就可以使用它来受控地访问主机系统的硬盘。
You are allowed controlled access to the host system's hard drive in the event you need to offload pertinent data from an otherwise "dead" machine.
为了阻止团队进行未受控制的取款,需要授权选择最佳操作,并使其他项目也可以访问它们。
In order for a team to stop making uncontrolled withdrawals, it will need to ratify its commitment to selected best practices, and make them pervasive on the project.
一些较新的方法,如具象状态传输(ReST),使用URL指定位置、对象和方法,提供受控制的文件访问。
Newer methods such as Representational State Transfer (ReST) provide managed file access using URLs to specify the location, object, and method.
标准的基于角色访问控制(RBAC)通过角色对用户和权限进行解耦,从受控资源角度来讲是一维的。
The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.
标准的基于角色访问控制(RBAC)通过角色对用户和权限进行解耦,从受控资源角度来讲是一维的。
The normal Role-Based Access Control(RBAC) model configures the model resources through roles, and this model is one-dimensional according to the manipulated resources.
应用推荐