• 单击add添加一个新的安全性约束

    Click add to add a new security restraint.

    youdao

  • 输入希望添加安全性约束war文件位置

    Enter the location of the war file that you want to add security constraints to.

    youdao

  • 我们完整的 DADX创建一个安全性约束

    We create a security contstraint for a whole DADX group.

    youdao

  • 安全性约束类似数据库中的GRANT语句

    Security constraints are similar to "GRANT" statements in the database.

    youdao

  • 清单5.web . xml中的安全性约束

    Listing 5. Security constraint inside web.xml.

    youdao

  • 安全性约束方法中的条件计算脱线上线过载限制检查

    In this method conditions for security constraints are calculated off-line and overload limits are checked on-line.

    youdao

  • 一些安全性约束不会自己显示为SecurityException。

    Some security restrictions do not show themselves as a SecurityException.

    youdao

  • 这个主体作为J2EE上下文来建立的,所以我们可以确保服务实现中定义安全性约束分派组件之前得到满足。

    The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.

    youdao

  • 根据web. xml文件指定安全性约束通常定义一个多个角色这些角色的用户拥有访问这些脚本适当权限

    You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.

    youdao

  • SOP一种安全性约束,它实际上禁止某个URL协议/主机/端口三元组)装载页面访问来自不同源的数据

    The SOP is a security restriction that basically forbids a page loaded from a certain origin (meaning the protocol/host/port trio of the URL) to access data from a different origin.

    youdao

  • 我们使用应用服务器工具集(Application Server Toolkit,ASTK)修改示例war文件增加安全性约束

    We are going to use the Application Server Toolkit (ASTK) to modify the sample war file to add security constraints.

    youdao

  • 方法权限安全性角色映射特定EJB方法安全性约束安全性角色映射到Web资源集合中,这些Web资源集合HTTp方法和URL模式一个组合

    Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.

    youdao

  • 接下来三个展示如何添加安全性约束8),如何设置正确URLHTTP方法(图9以及如何针对该约束允许DADXUser角色(图10)。

    The next 3 figures show how to add the security constraint (Figure 8), how to set the right URL and HTTP methods (Figure 9) and how to allow the role "DADXUser" for that constraint (Figure 10).

    youdao

  • servletweb.xml文件包含一个 <security-constraint>元素元素定义安全性约束应用的 HTTP方法以及使用约束的角色。

    The web.xml file for the servlet contains a <security-constraint> element that defines the security constraint, the HTTP methods that it applies to, and the roles that use the constraint.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引请指定传输对象

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes. Specify the object (s) to transfer.

    youdao

  • 银行预算约束存在使银行业风险监管的有效性受到了很大影响通过最低资本规定无法有效实现金融体系安全性稳定性目标。

    Soft budget constraint greatly reduced the effect of banking risk supervision, so it's not easy to realize the safety and stability of financial system only with minimum capital requirement.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制表、数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 模型解决了传统基于角色访问控制中的动态适应性差最小权限约束假象问题,用于分布式工作流管理系统提高安全性实用性

    This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.

    youdao

  • 模型解决了传统基于角色访问控制中的动态适应性差最小权限约束假象问题,用于分布式工作流管理系统提高安全性实用性

    This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定