实现基于角色的安全性的步骤
设置基于角色的安全性比大部分人所想的更轻松。
Setting up role-based security is easier than most people think.
用于实现基于角色的安全性的IBMCognosbi特性。
IBM Cognos BI features for implementing Role based security.
我们可以使用标准的J2EE基于角色的安全性来管理打印机访问。
We could potentially use standard J2EE role-based security to manage printer access.
基于角色的安全性是组织命令、实现安全性最简单的方法。
Role-based security is the most straightforward way to organize commands for security purposes.
结合基于角色的安全性,IBMCognosBI还提供动态报告功能。
In conjunction with Role based Security, IBM Cognos bi also offers dynamic reporting capability.
基于角色的安全性是一种用户级安全性,主要关注用户的逻辑角色而不是个人身份。
Role based security is described as user-level security which focuses on the logical role of a user rather than the user's individual identity.
要创建实现基于角色的安全性的动态报告,可使用以下IBMCognosBI功能。
To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.
对于给定应用程序域,宿主可更改默认的基于角色的安全性策略并设置默认安全主体。
For a given application domain, the host can change the default role-based security policy and set a default security principal.
基于角色的安全性是保护企业信息资产的一个不错的方法,而且它可能比您想象的更容易实现。
Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.
首先确定您的网站上需要访问WebSphereMQ的命令,然后实现基于角色的安全性,从而对命令进行分组。
Determining the roles at your site that require access to WebSphere MQ commands, and then implementing role-based security can provide a way to group the commands.
基于角色的安全性权限,此类权限提供一种判别机制,用以确定用户(或代表用户进行操作的代理)是否具有特定的身份,或是否为指定角色的成员。
Role-Based Security Permissions, which provide a mechanism for discovering whether a user (or the agent acting on the user's behalf) has a particular identity or is a member of a specified role.
文章提供了。NET框架安全性方面的概述,具体讲述基于角色的安全性、代码访问安全性、验证、堆栈审核、隔离存储、加密等方面的核心安全技术。
This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.
下面,我们将使用我们的一个样例包“Great Out doorsWarehouse”展示如何根据基于角色的安全性创建动态报告(见图2)。
Now we will explain the method of how to create dynamic reporting based on Role based security by using one of our sample packages, "Great Outdoors Warehouse". (Figure 2).
V 4符合J2EE 1.2基于安全性角色而不是方法组的授权模型。
V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.
使用DWR部署到Web应用程序极为简单,而且DWR的安全性特性可以与J2EE基于角色的验证系统集成。
It's extremely simple to deploy to your Web application using DWR, and DWR's security features can be integrated with a J2EE role-based authentication system.
ReportingServices安全性使用熟悉的基于角色的模型。
Reporting Services security uses a familiar role-based model.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
为了提高系统的安全性,作者采用了RBAC模型设计和实现了系统基于角色的安全权限模块。
To enhance system security, the author designed and realized security limit model base on role control using RBAC.
在安全方面,系统采用基于资源角色的权限管理,增强了系统运行的安全性。
The system used authority management based on resource roles to enhance the security.
本文以海鼎多业态商业自动化系统(HDPOS5)为例,将改进的基于岗位与角色的访问控制模型应用到该系统中,更好的保证了系统的安全性。
This paper takes heading multiple area automatic commerce system (HDPOS5) for example, applied the improved base on position and role access control model to system, ensure the security of the system.
近几年产生的基于数字证书的认证和基于角色的访问控制具有安全性高、管理灵活的特征,对于加强系统的安全性很有应用前景。
Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.
在安全方面,系统采用基于资源角色管理的权限管理,增强了系统运行的安全性。
In the area of security, system-based resource management role in the competence of management, enhance the operation of the system's security.
在安全方面,采用基于角色的权限管理,增强了系统运行的安全性。
In terms of security, role-based rights management enhances the security of the system in the run.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
该模型解决了传统的基于角色访问控制中的动态适应性差和最小权限约束假象的问题,用于分布式工作流管理系统,提高了安全性、实用性。
This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.
应用推荐