• 远程访问策略授予拒绝符合指定条件用户访问权。

    A remote access policy can either grant or deny access to users who match the specified conditions.

    youdao

  • 比如需要切分访问策略、一个切分选择策略一个切分处理策略

    Namely, it needs a shard-access strategy, a shard-selection strategy, and a shard-resolution strategy.

    youdao

  • MHTDMA根据内节点竞争情况来调整节点的信道访问策略

    MHTDMA adjust channel access strategy depending on the level of contention in the network.

    youdao

  • DB 2 II一种我们透明方式代表我们确定执行适当的数据访问策略

    It also determined and executed an appropriate data access strategy on our behalf in a manner that was transparent to us.

    youdao

  • 客户上,按照服务相同步骤访问策略选择客户端BLA组合服务。

    On the client side, access the policy sets and binding panel by following the same path as the service side, but choose the client BLA, composite, and service instead.

    youdao

  • 最后我们需要确定整体数据访问策略——检索什么数据,如何每个过滤数据

    And finally, we needed to determine our overall data access strategywhich data to retrieve first, how we would filter data at each source, etc.

    youdao

  • 由此本文需要解决如何集中定制安全访问策略规则,以及有效实施安全策略交互

    All of these issues are solved in the thesis, including how to generate secure access policy rules centralized and how to enforce secure policy distribution efficiently.

    youdao

  • 需要一种方式入站消息执行低权限的访问策略通常可以通过MCAUSER来实现。

    You still need a way to enforce a low-privileged access policy on inbound messages, and that is usually through MCAUSER.

    youdao

  • 利用增加缓冲必须重新绑定应用程序使优化器在决定访问策略考虑缓冲池大小。

    To take advantage of the increased buffer pool, you must rebind the applications for the optimizer to consider the buffer pool size when deciding its access strategy.

    youdao

  • 它已经随着。NET 3.5SP1发布了,目前被认为微软不断变化数据访问策略重要部分

    Released with.net 3.5 SP1, it is currently considered to be a major part of Microsoft's ever-changing data access strategy.

    youdao

  • 可以特定用户添加策略,可以使用Administer theServer界面访问策略

    The policies can be added for specific users or groups and can be accessed using the Administer the Server interface.

    youdao

  • 本文通过设计模式方法研究并且结合招生行业实际问题提出基于模式数据访问策略

    Through the study of design pattern and practical problem in enrollment trade, the text proposes the data access model based on solving coupling problem.

    youdao

  • 访问决策子系统负责解析用户属性证书提取用户属性,并根据访问策略信息和用户属性实现对资源的访问控制

    It deals with user's attribute certificate and implements the access control based on access policy and user's attributes.

    youdao

  • 程序员可以透明地使用来自这些不同数据源数据,并通过DB2II全局查询优化器选择一个有效的数据访问策略

    Programmers can work transparently with data from these various sources, relying on DB2 II's global query optimizer to select an efficient data access strategy for such work.

    youdao

  • 然后可以根据时效访问策略,通过人工手动自动化数据转移程序,数据——主要是非结构化的数据——转移至云存储中。

    Datamostly unstructuredcould then be relegated to the cloud, either manually or with an automated data mover based on aging and access policies.

    youdao

  • 如果SSL通道身份验证基础,则必须使用出口将SSL证书标识绑定到MCAUSER,以便API调用应用访问策略

    If SSL channels are the basis for authentication, an exit must be used to tie the SSL certificate identity to an MCAUSER so that access policies can be applied to API calls.

    youdao

  • OLAP服务器应用程序随处可见,并且很多存储模式查询机制访问策略也已经开发出来满足复杂分析查询业务需求

    OLAP servers and applications are commonplace and many storage schemes, query mechanisms, and access strategies have been developed to meet the business demand for complex analytical querying.

    youdao

  • PMS可以通过允许客户端服务通过域名访问策略集合中的多个策略取得策略设置实现服务通知一个策略能力

    The PMS can implement the ability for one service to inform another of the policy by allowing client services to fetch policy settings by domain name across multiple policies in a policy set.

    youdao

  • 提出一种基于委托逻辑访问控制模型——dlbac,将凭证RBAC元素访问策略转化为统一的委托逻辑规则

    The paper puts forward a delegation logic based access control model (DLBAC). It translates the credentials, RBAC elements and access policies into unified delegation logic rules.

    youdao

  • DB 2Information Integrator自动分析各种可能数据访问策略成本选择一个高效策略执行

    WebSphere Information Integrator automatically analyzes the costs of various possible data access strategies and selects an efficient one for execution.

    youdao

  • 例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • 是否需要应用访问目的策略配置某些更多部分

    Do I need to configure something more apart from applying access intent policy?

    youdao

  • 编写访问控制策略

    Writing the access control policy.

    youdao

  • 存储访问功能策略执行功能监视功能一样,技术功能可以通过手工或者软件来实现

    Technology capabilities, like store and access capability, policy enforcement capability, or monitoring capability, may be satisfied by manual or software.

    youdao

  • 可以设计访问控制策略以便根据用户特定组织中的角色进行授权。

    You can design access control policies to grant authority to a user based on their role in a particular organization.

    youdao

  • 不同访问意图策略触发不同的物理连接分配

    Different access intent policies trigger different physical connections to be allocated.

    youdao

  • 本文后面的部分,看到使用简单访问控制策略构建一个样应用程序

    Later in the article, you'll see the simple access control policy used in building a sample application.

    youdao

  • 拦截器使用应用程序访问控制策略做出授权决定

    Interceptors use your application's access control policy to make authorization decisions.

    youdao

  • 大多数LOB 对于自己资源有自己的访问策略”。

    Most LOB’s have their own "policy" for access to the resources they own.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定