DAC机制通过数据库会话拥有的权限来进行数据库对象的访问控制。
The DAC mechanism controls access to database objects based on the privileges enabled in the database session.
更好的解决方案可能是通过使用模式控制数据库对象访问。
A better solution might be to control database object access through the use of schemas.
这样使得您可以为文件系统对象建立细粒度的访问控制,并且支持继承特性。
This allows you to establish fine-grained access control for file system objects and support inheritance features.
访问控制列表(acl)是具有所有者和索引列表或散列的对象,如图2所示。
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
最后,讨论了在多用户环境中如何使用模式有效地控制对数据库对象的访问。
Finally, we covered how schemas can be used as an effective mechanism for controlling access to database objects in multi-user environments.
它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。
It also contains security namespace information and access control policies on all the Cognos objects.
使用模式控制对数据库对象的访问。
Cheetah提供了一门简单语言,用来定义提供基本流控制和对象访问构造的模板。
Cheetah provides a simple language for defining templates that provides basic flow control and object access constructs.
在本例中,cglib2aopproxy类将创建安全bean访问控制所需的代理对象。
In this case, the Cglib2AopProxy class creates the proxy objects you will need to control access to your secure beans.
获得会话对象之后,可以使用由LTPAToken定义的授权给用户的访问控制级别在它与LotusDomino服务器之间实现交互。
Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.
控制器还使用Ajax调用访问相应的Domino资源、填充相应的model对象并且将其传递给视图进行显示。
The controller also accesses the appropriate Domino resource using Ajax calls and populates the appropriate model object and passes it to the view to display.
它以一种面向对象的方式提供访问资产清单的对象和方法,并提供对资产已扩展元数据的完全控制。
It provides objects and methods for accessing the asset manifest in an object-oriented style and offers full control on the extended metadata of the assets.
在s3中定义对象或存储段时,您可以指定一个访问控制策略,注明谁可以访问您的S3资产以及如何访问(例如,读和写权限)。
When you define an object or a bucket in S3, you can specify an access-control policy that states who can access your S3 assets and how (for example, read and write permissions).
应用程序的主要层是数据库、持久性框架、数据库访问对象和用户界面(UI)控制器及视图层。
The main layers of the application are a database, a persistence framework, a database access object, and user interface (UI) controller and view layers.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
提取的元数据包括一些数据模型对象,例如项目类和它们的属性,还有一些管理对象,例如用户定义和访问控制列表。
The extracted metadata includes data model objects, such as item types and their attributes, and administration objects, such as user definitions and access control lists.
创建好所有必需的数据库对象和包之后,使用组成员关系和组特权来控制对所创建的数据库对象和包的访问。
Once all required database objects and packages are created, use group membership and group privileges to control access to the created database objects and packages.
访问控制有可能是将活动目录分为内部和外部活动目录,也可能是精心挑选过对象的活动目录。
It is inter - and extra - enterprise Active Directory and will potentially be the Active Directory of choice.
它们是我的对象和类,我应该控制它们所有的访问接口,所以你不要来烦我。
They are my objects my classes. I control all the accesses to them, so dont bother me.
LBAC通过为表对象添加安全标签来控制对它的访问。
LBAC controls access to table objects by attaching security labels to them. Users attempting to access an object must have its security label granted to them.
配置应用程序的主要层——在RentaBike应用程序中,我公开了一个数据访问对象(dao)层、一个控制器层和一个视图层(参阅清单1)。
Configuration Major layers of the application — in the RentaBike application, I expose a Data Access Object (DAO) layer, a controller layer, and a view layer (see Listing 1).
您可以使用访问控制列表(Access Control List,ACL)在products控制器中创建一个操作,并使用它为每个经销商aco上的用户访问请求对象(ARO)授权create访问权限。
Using access-control lists (ACLs), you could have created an action in the products controller and used it to grant create access to the user's access-request object (ARO) on each dealer ACO.
一些较新的方法,如具象状态传输(ReST),使用URL指定位置、对象和方法,提供受控制的文件访问。
Newer methods such as Representational State Transfer (ReST) provide managed file access using URLs to specify the location, object, and method.
图2的中心展示的是Tivoli的WebSEAL产品,该产品充当代理的角色并提供安全机制来控制对网络中的文档以及Web对象的访问。
In the center of the diagram in Figure 2 is Tivoli's WebSEAL product, which serves the role of a proxy and provides a security mechanism to control access to documents and Web objects in the network.
在此基础上,Spring2.5又加入了两个新的注解 —— @Service和@Controller来完成为通常的三层架构(数据访问对象、服务、web控制器)角色委任。
Spring 2.5 adds two new annotations - @Service and @Controller - to complete the role designations for a common three-tier architecture (data access objects, services, and web controllers).
给出了一种用于保护面向对象编程系统的资源模块的访问控制机制。
An access control mechanism is given for the protection of the resource module in the object oriented programming systems.
采用消息过滤算法可以在支持对象模型的多级安全系统中实现强制访问控制。
Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.
该解决方案架构在先进的J2EE平台之上,应用MVC模式、会话模式和在数据访问对象模式等J2EE开发模式,从收和发两个方向对电子邮件进行了有效控制。
This resolving scheme is based on advanced J2EE platform, applies MVC pattern, Session Facade pattern and Data Access Object pattern to control E-mail from two directions of sending and receiving.
代理模式:为另一个对象提供一个替身或占位符以控制这个对象的访问。
The Proxy Pattern: provides a surrogate or placeholder for another object to control access to it.
代理模式:为另一个对象提供一个替身或占位符以控制这个对象的访问。
The Proxy Pattern: provides a surrogate or placeholder for another object to control access to it.
应用推荐