远程访问策略可授予或拒绝符合指定条件的用户的访问权。
A remote access policy can either grant or deny access to users who match the specified conditions.
比如,需要一个切分访问策略、一个切分选择策略和一个切分处理策略。
Namely, it needs a shard-access strategy, a shard-selection strategy, and a shard-resolution strategy.
MHTDMA根据网内节点的竞争情况来调整节点的信道访问策略。
MHTDMA adjust channel access strategy depending on the level of contention in the network.
DB 2 II还以一种对我们透明的方式代表我们确定和执行适当的数据访问策略。
It also determined and executed an appropriate data access strategy on our behalf in a manner that was transparent to us.
在客户端上,按照与服务端相同的步骤访问策略集,但选择客户端BLA、组合和服务。
On the client side, access the policy sets and binding panel by following the same path as the service side, but choose the client BLA, composite, and service instead.
最后,我们还需要确定整体数据访问策略——先检索什么数据,如何在每个源上过滤数据等。
And finally, we needed to determine our overall data access strategy — which data to retrieve first, how we would filter data at each source, etc.
由此,本文需要解决如何集中定制安全访问策略规则,以及有效实施安全策略交互。
All of these issues are solved in the thesis, including how to generate secure access policy rules centralized and how to enforce secure policy distribution efficiently.
您还需要一种方式对入站消息执行较低权限的访问策略,这通常可以通过MCAUSER来实现。
You still need a way to enforce a low-privileged access policy on inbound messages, and that is usually through MCAUSER.
要利用增加的缓冲池,您必须重新绑定应用程序,以使优化器在决定其访问策略时考虑缓冲池大小。
To take advantage of the increased buffer pool, you must rebind the applications for the optimizer to consider the buffer pool size when deciding its access strategy.
它已经随着。NET 3.5SP1发布了,目前被认为是微软不断变化的数据访问策略的重要部分。
Released with.net 3.5 SP1, it is currently considered to be a major part of Microsoft's ever-changing data access strategy.
可以为特定用户或组添加策略,可以使用Administer theServer界面访问策略。
The policies can be added for specific users or groups and can be accessed using the Administer the Server interface.
本文通过对设计模式方法的研究,并且结合招生行业的实际问题,提出了基于解耦模式的数据访问策略。
Through the study of design pattern and practical problem in enrollment trade, the text proposes the data access model based on solving coupling problem.
访问决策子系统负责解析用户属性证书和提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制。
It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.
程序员可以透明地使用来自这些不同数据源的数据,并通过DB2II全局查询优化器来选择一个有效的数据访问策略。
Programmers can work transparently with data from these various sources, relying on DB2 II's global query optimizer to select an efficient data access strategy for such work.
然后,可以根据时效和访问策略,通过人工手动或自动化数据转移程序,将数据——主要是非结构化的数据——转移至云存储中。
Data — mostly unstructured — could then be relegated to the cloud, either manually or with an automated data mover based on aging and access policies.
如果SSL通道是身份验证的基础,则必须使用出口将SSL证书标识绑定到MCAUSER,以便向API调用应用访问策略。
If SSL channels are the basis for authentication, an exit must be used to tie the SSL certificate identity to an MCAUSER so that access policies can be applied to API calls.
OLAP服务器和应用程序随处可见,并且很多存储模式、查询机制和访问策略也已经被开发出来,以满足复杂分析查询的业务需求。
OLAP servers and applications are commonplace and many storage schemes, query mechanisms, and access strategies have been developed to meet the business demand for complex analytical querying.
PMS可以通过允许客户端服务通过域名访问策略集合中的多个策略取得策略设置来实现一个服务通知另一个策略的能力。
The PMS can implement the ability for one service to inform another of the policy by allowing client services to fetch policy settings by domain name across multiple policies in a policy set.
提出了一种基于委托逻辑的访问控制模型——dlbac,将凭证、RBAC元素和访问策略转化为统一的委托逻辑规则。
The paper puts forward a delegation logic based access control model (DLBAC). It translates the credentials, RBAC elements and access policies into unified delegation logic rules.
DB 2Information Integrator自动分析各种可能的数据访问策略的成本,并选择一个高效策略来执行。
WebSphere Information Integrator automatically analyzes the costs of various possible data access strategies and selects an efficient one for execution.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
我是否需要在应用访问目的策略时配置某些更多的部分?
Do I need to configure something more apart from applying access intent policy?
编写访问控制策略。
像存储和访问功能、策略执行功能或监视功能一样,技术功能也可以通过手工或者软件来实现。
Technology capabilities, like store and access capability, policy enforcement capability, or monitoring capability, may be satisfied by manual or software.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
不同的访问意图策略触发不同的物理连接分配。
Different access intent policies trigger different physical connections to be allocated.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
Later in the article, you'll see the simple access control policy used in building a sample application.
拦截器使用应用程序的访问控制策略来做出授权决定。
Interceptors use your application's access control policy to make authorization decisions.
大多数LOB 对于自己的资源有自己的访问 “策略”。
Most LOB’s have their own "policy" for access to the resources they own.
应用推荐