• 实现基于角色安全性步骤

    Steps to implement Role based security

    youdao

  • 设置基于角色安全性大部分所想轻松。

    Setting up role-based security is easier than most people think.

    youdao

  • 用于实现基于角色安全性IBMCognosbi特性

    IBM Cognos BI features for implementing Role based security.

    youdao

  • 我们可以使用标准J2EE基于角色的安全性管理打印机访问

    We could potentially use standard J2EE role-based security to manage printer access.

    youdao

  • 基于角色安全性组织命令、实现安全性简单方法

    Role-based security is the most straightforward way to organize commands for security purposes.

    youdao

  • 结合基于角色安全性IBMCognosBI提供动态报告功能

    In conjunction with Role based Security, IBM Cognos bi also offers dynamic reporting capability.

    youdao

  • 基于角色安全性用户级安全性主要关注用户逻辑角色不是个人身份。

    Role based security is described as user-level security which focuses on the logical role of a user rather than the user's individual identity.

    youdao

  • 创建实现基于角色安全性动态报告使用以下IBMCognosBI功能

    To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.

    youdao

  • 对于给定应用程序宿主更改默认基于角色安全性策略设置默认安全主体

    For a given application domain, the host can change the default role-based security policy and set a default security principal.

    youdao

  • 基于角色安全性保护企业信息资产一个不错的方法而且可能想象容易实现

    Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.

    youdao

  • 首先确定网站上需要访问WebSphereMQ命令然后实现基于角色安全性,从而对命令进行分组

    Determining the roles at your site that require access to WebSphere MQ commands, and then implementing role-based security can provide a way to group the commands.

    youdao

  • 基于角色安全性权限,此类权限提供一种判别机制,用以确定用户(代表用户进行操作代理)是否具有特定身份,或是否指定角色成员

    Role-Based Security Permissions, which provide a mechanism for discovering whether a user (or the agent acting on the user's behalf) has a particular identity or is a member of a specified role.

    youdao

  • 文章提供了NET框架安全性方面概述具体讲述基于角色安全性代码访问安全性验证堆栈审核、隔离存储加密等方面的核心安全技术。

    This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.

    youdao

  • 下面我们使用我们一个样例Great Out doorsWarehouse”展示如何根据基于角色安全性创建动态报告(见图2)。

    Now we will explain the method of how to create dynamic reporting based on Role based security by using one of our sample packages, "Great Outdoors Warehouse". (Figure 2).

    youdao

  • V 4符合J2EE 1.2基于安全性角色不是方法授权模型

    V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.

    youdao

  • 使用DWR部署Web应用程序极为简单而且DWR的安全性特性可以J2EE基于角色验证系统集成

    It's extremely simple to deploy to your Web application using DWR, and DWR's security features can be integrated with a J2EE role-based authentication system.

    youdao

  • ReportingServices安全性使用熟悉基于角色的模型

    Reporting Services security uses a familiar role-based model.

    youdao

  • 安全性更改另一个主要方面,它体现在WebSphere安全性授权模型基于角色安全性转变中。

    Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.

    youdao

  • 为了提高系统安全性作者采用RBAC模型设计实现了系统基于角色安全权限模块。

    To enhance system security, the author designed and realized security limit model base on role control using RBAC.

    youdao

  • 安全方面,系统采用基于资源角色权限管理增强系统运行的安全性

    The system used authority management based on resource roles to enhance the security.

    youdao

  • 本文以海鼎业态商业自动化系统(HDPOS5)改进基于岗位角色访问控制模型应用该系统中,更好的保证系统的安全性

    This paper takes heading multiple area automatic commerce system (HDPOS5) for example, applied the improved base on position and role access control model to system, ensure the security of the system.

    youdao

  • 近几年产生基于数字证书认证基于角色访问控制具有安全性高、管理灵活特征对于加强系统安全性有应用前景

    Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.

    youdao

  • 安全方面系统采用基于资源角色管理权限管理,增强系统运行安全性

    In the area of security, system-based resource management role in the competence of management, enhance the operation of the system's security.

    youdao

  • 安全方面采用基于角色权限管理增强了系统运行安全性

    In terms of security, role-based rights management enhances the security of the system in the run.

    youdao

  • 模型解决了传统基于角色访问控制中的动态适应性差最小权限约束假象问题,用于分布式工作流管理系统提高安全性实用性

    This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.

    youdao

  • 模型解决了传统基于角色访问控制中的动态适应性差最小权限约束假象问题,用于分布式工作流管理系统提高安全性实用性

    This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定