权限模型:权限模型允许对系统中的任何内容应用用户角色。
Permissions model: the permissions model allows user roles to be applied to any in the system.
不管应用程序的访问控制基于密码还是基于角色,您都需要一个登录和注销系统来处理用户身份验证。
Regardless of whether your application's access control will be based on passwords or roles, you'll still need a login and logout system to handle user authentication.
应用系统可能包含协调者的角色,在某种程度上它变得越来越不清晰,为什么协议的必要性要远大于业务逻辑本身?
the application may subsume the role of the coordinator at which point it becomes less and less clear why the protocol is needed at all above and beyond the business logic itself.
一家致力于开发整合家居系统和家用设备软件的公司,打赌移动应用将会在未来的一体化家庭生活中扮演相当重要的角色。
Control4, a company that develops software to integrate home systems and household devices, is betting that mobile apps will be a huge player in the integrated household of the future.
在许多公司中,该角色分为两个:一个负责硬件和操作系统,而另一个负责管理应用程序。
In many companies, this is split into two roles: one responsible for hardware and operating systems and another responsible for administering applications.
我认为一名软件架构师能做的最重要的事情,是小心地思考应用程序的业务角色,将它们紧紧地映射进一个基于角色的访问控制系统。
In my view the most important thing a software architect can do is to think carefully about the application's business roles and map them tightly into a role-based access control system.
系统管理员是在BPEContainer应用程序上定义的角色。
The system administrator is a role defined on the BPEContainer application.
可以开发Web服务安全策略应用程序来让系统管理员为具有不同角色和职责的用户自定义设置。
You can develop a Web services security policies application to allow the system administrators custom the settings for users with different roles and responsibilities.
在这个模式中,mashuphub扮演着关键的角色,它与不支持聚合格式的已有系统交互,使mashup应用程序可以利用它们。
In this pattern, the mashup hub plays a critical role in interfacing with existing systems that do not support syndication formats so that they can be easily exploited by mashup applications.
使用DWR部署到Web应用程序极为简单,而且DWR的安全性特性可以与J2EE基于角色的验证系统集成。
It's extremely simple to deploy to your Web application using DWR, and DWR's security features can be integrated with a J2EE role-based authentication system.
本文首先讨论语义角色的三种精细程度不一的分类层级,介绍它们各自在语言信息处理系统中的有关应用。
This paper firstly discusses three kinds of level in the fineness hierarchy of semantic roles, and introduces their application in some systems of natural language processing(NPL).
文章分析了RBAC96模型,并结合一个办公自动化系统的具体应用,对模型进行扩充,提出了业务角色的概念。
The RBAC96 model is analyzed and extended, and eventually the concept of "business role" by combining a specific application in an office automation system is proposed.
本文分析了RBAC96模型,并结合在一个办公自动化系统的具体应用,对模型进行扩充,提出了业务角色的概念。
The paper analyzes the RBAC96 model and then extends the model and eventually proposes the concept of "business role" by combining a specific application in an office automation system.
基于角色的访问控制是一种强制形式的访问控制,在操作系统层次上和数据库中已经存在了大量的应用,并且取得了很好的效果。
Role Based access control is an compulsive access control. There are lots of its application in operation system level and database, being of much effect in these aspects.
“无人”系统在中东冲突中被大量应用,不是用于搜索城市的街道迷宫就是在偏远乡村充当侦察兵角色。
"Unmanned" systems have proliferated in conflicts in the Middle East, either helping to negotiate the urban labyrinth of streets and alleyways or acting as scouts in remote villages.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
数据库应用系统测试区别于传统软件测试的一个重要特征是数据库状态,它在测试用例的执行中扮演了非常重要的角色。
Different from traditional software testing, database application system testing has an important characteristic — database State, playing a very important role in the execution of the test cases.
从实验室教学管理系统的特点出发,讨论了基于角色的访问控制模型RBAC在实验室教学管理系统中应用的优势。
Based on the features of the laboratory education information system, this paper discussed the advantages of the application of role-based access control (RBAC) in the system.
在许多应用系统中,权限管理扮演着重要的角色。
In many applications, the privilege management plays an important role.
本论文研究基于角色的访问控制技术及其在法院系统中的应用。
The dissertation is dedicated to Role-Based Access Control (RBAC) technology and its application in court case management information system.
实践证明,GIS应用系统中基于角色的图元授权粒度控制对具体工作单位的运作具有真正意义上的实用性。
The practice has proved that the research of role-based geographic entities authorized granularity control in GIS is really practicable.
可采用单点登陆、PKI认证、授权、基于角色的权限分配策略、利用应用网关访问资源,开发适合本系统的工作流访问机制等措施确保信息平台的安全。
The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.
本文以海鼎多业态商业自动化系统(HDPOS5)为例,将改进的基于岗位与角色的访问控制模型应用到该系统中,更好的保证了系统的安全性。
This paper takes heading multiple area automatic commerce system (HDPOS5) for example, applied the improved base on position and role access control model to system, ensure the security of the system.
在大型、具有不同系统环境中,由于存在各种各样的应用、平台、资源类型和用户角色,访问管理会变得非常复杂。
Access Management can become very complex in large heterogeneous environments due to the variety of diverse applications, platforms, resources, and user roles.
近几年产生的基于数字证书的认证和基于角色的访问控制具有安全性高、管理灵活的特征,对于加强系统的安全性很有应用前景。
Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.
描述了一种用户角色映射(urm)的方法,设计实现一种规则引擎,并将其应用于实际访问控制系统。
It explains a user role mapping (URM) method, designs and implements a rule engine which has been adopted by a real access control system.
描述了一种用户角色映射(urm)的方法,设计实现一种规则引擎,并将其应用于实际访问控制系统。
It explains a user role mapping (URM) method, designs and implements a rule engine which has been adopted by a real access control system.
应用推荐