权限模型必须提供足够的拥有、查看、编辑和协作权限级别。
The permissions model must allow for sufficient levels of ownership, viewing, editing, and collaboration rights.
权限模型:权限模型允许对系统中的任何内容应用用户角色。
Permissions model: the permissions model allows user roles to be applied to any in the system.
Linux权限模型每个文件系统对象有3种类型。
The Linux permission model has three types of permission for each filesystem object.
主要研究了解决复杂数据权限的问题,最后验证此权限模型的正确性和通用性。
The main purpose of this study is to solve complex data permission issues and verify whether the permission model is correct and universal or not.
如果您知道特定的用户子类增加了对应用程序特定部分的责任,则可能还要重新考虑权限模型。
You might also reconsider your privilege model if you know that a certain subclass of users has increased responsibility over a certain part of the application.
Linux权限模型有两个特殊的访问模式,名为suid(设置用户id)和sgid(设置组id)。
The Linux permissions model has two special access modes called suid (set user id) and sgid (set group id).
文中给出了基于RBAC改进的统一权限模型,并在此模型的基础上详细阐述了满足统一性要求的权限管理系统体系结构。
This paper also gives out a new access control model based on RBAC, and expatiates the system architecture which meets the requirement of unification.
从建立PD M中的权限模型的角度出发,提出了基于规则的产品数据访问权限管理方法,从而对权限的分配更加简洁清晰,并大大提高了PD M系统的运行效率。
To create the right model, this paper proposes the rule-based method of access management, by which rights can be assigned more clearly and the integration system can run much more efficiently.
另一方面,JACC并未提供对执行非标准权限检查的支持,而扩展J2EE安全模型又将需要这种支持。
On the other hand, JACC does not supply support for performing non-standard permission checking, as would be required in extending the J2EE security model.
请注意,如果模型生成改成基于客户端,那么只有客户端有权限访问源数据。
Note that if the model generation is changed to client based only the client has access to the source data.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
The end to end security model would mean that all providers give access to all trusted requesting applications.
J2EE安全模型以方法权限为基础,因此对于细粒度的安全访问来说,它既不切实际又很麻烦。
The J2EE security model is based on method permission, so it is impractical and cumbersome for fine grained security access.
授予门户当前导航和内容模型的读取权限。
Gives read access to the current navigation and content model of the portal.
图1显示了内容模型的示例,在该示例中,当前用户仅拥有对某些子树节点(从节点1.2开始)的“查看”权限。
Figure 1 shows an example of a content model in which the current user possesses only VIEW rights to some of the nodes of the sub-tree, starting at node 1.2.
这些用户需要以适合自己的需要和权限的方式访问和查看模型。
These users need to be able to access and view the models in ways that fit with their needs and authority.
这种政策处理的问题是,谁拥有权限在不同的模型层之间,来回移动模型变更。
This policy addresses the concerns about who has the authority to move model changes back and forth across model layer boundaries.
示例授权模型非常简单,它只定义单个权限,即登录权限。
The example authorization model is very simple in that it only defines a single permission, the entry permission.
多租户权限数据模型设计和授权过程。
Multi-tenant permission data model design and authorization process.
PublishingServerAccessControl——此小部件用于向用户授予在Publishing Server中发布和查看模型的权限,如图3所示。
Publishing Server Access Control - This widget is used to grant rights to users to publish and view models in Publishing Server, as shown in Figure 3.
重要的是要理解当前安全模型、用户角色、权限和应用程序功能。
It's important to understand the current security model, user roles, permissions and capabilities of the application. The following points helps in evaluating the maturity of security architecture.
仍然需要谨慎,以免不小心通过LocalDomainServers或其他一些组授予所有服务器访问所有数据的权限,因此制定此类模型之后应小心地进行测试。
You still need to be careful that you don't unintentionally grant all servers access to all data through LocalDomainServers or some other group, so test carefully after rolling out such a model.
BusinessServicesSubscriberManager是基于Web的控制台,它使用组织注册和订阅模型管理业务服务权限。
Business Services Subscriber Manager is a Web-based console that manages business service entitlements using an organizational enrollment and subscription model.
然而,有时我们的代码必须要执行一些SharePoint对象模型中对某些用户有限制的方法,即使该请求是由一个没有该操作权限的人发起的。
However, occasionally your code must call restricted methods within the Windows SharePoint Services object model even though the request is initiated by a nonprivileged user.
几乎每个现代操作系统都使用基于位屏蔽权限的模型,该模型基于主体和组按主体处理资源控制。
Nearly every modern OS makes use of a bit-masking permission-based model that deals with the control of resources by principals, based on principals and groups.
该模型既实现了系统中静态的信息安全访问要求,又实现了权限管理中动态的变化要求。
Using this model, we can realize both the requirements of the static security policy of the system and the dynamic requirements of the real world.
使你的模型中包含内置验证机制和数据库访问权限。
Make your models self-contained with built-in validation and database access.
本论文结合实际应用系统的需求,设计并实现了基于扩展模型理念的权限系统。
Combined with real requirement, this paper sets out design and realization of permission system based on the extended model.
本文在对传统电子政务软件的开发效率进行详细分析和研究的基础上,提出了一种新的基于模型的权限控制方法。
In the base of the analysis and investigations of the exploiture efficiency of traditional E-Government affair softwares, this paper has put forward a new rights control method which based on models.
本文分析了基于项目流的分解与控制问题,借助U ML对在动态权限限定下的流程进行模型化描述。
This paper analyzed the problem of disturbing and controlling based on project flow by description of flow changing modelling through dynamic right confined by UML.
本文分析了基于项目流的分解与控制问题,借助U ML对在动态权限限定下的流程进行模型化描述。
This paper analyzed the problem of disturbing and controlling based on project flow by description of flow changing modelling through dynamic right confined by UML.
应用推荐