A better solution might be to control database object access through the use of schemas.
更好的解决方案可能是通过使用模式控制数据库对象访问。
Cheetah provides a simple language for defining templates that provides basic flow control and object access constructs.
Cheetah提供了一门简单语言,用来定义提供基本流控制和对象访问构造的模板。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.
获得会话对象之后,可以使用由LTPAToken定义的授权给用户的访问控制级别在它与LotusDomino服务器之间实现交互。
There are various permissions - read, write, full control - assigned to users, and access granularity established at bucket or object level.
这是各种权限:读、写、完全控制、指定给用户、bucket或对象级别的访问粒度。
The OleAutomation object allows you to access properties and execute commands that are provided by the ActiveX control.
OleAutomation对象允许开发人员访问特性并执行activex控件所提供的命令。
When you define an object or a bucket in S3, you can specify an access-control policy that states who can access your S3 assets and how (for example, read and write permissions).
在s3中定义对象或存储段时,您可以指定一个访问控制策略,注明谁可以访问您的S3资产以及如何访问(例如,读和写权限)。
The annotated interface that defines the data access object provides a central control point to manage the SQL statements for the entire application.
带注释的接口为管理整个应用程序的sql语句提供一个集中控制点。
An access control mechanism is given for the protection of the resource module in the object oriented programming systems.
给出了一种用于保护面向对象编程系统的资源模块的访问控制机制。
Using access-control lists (ACLs), you could have created an action in the products controller and used it to grant create access to the user's access-request object (ARO) on each dealer ACO.
您可以使用访问控制列表(Access Control List,ACL)在products控制器中创建一个操作,并使用它为每个经销商aco上的用户访问请求对象(ARO)授权create访问权限。
The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).
安全管理员可以通过应用protectedobjectpolicies (POP)和access controllists (acl)规则来指定安全等级。
Provide a surrogate or placeholder for another object to control access to it.
为其他对象提供一种代理以控制对这个对象的访问。
The Proxy Pattern: provides a surrogate or placeholder for another object to control access to it.
代理模式:为另一个对象提供一个替身或占位符以控制这个对象的访问。
OPC applies OLE (Object Linking and Embedding) technology into Industry Process Control Fields, and provides a kind of standard data access method.
OPC把对象链接和嵌入技术应用于工业过程控制领域,为工业控制领域提供了一种标准的数据访问机制。
Finally, this paper describes the implementation of the major functions, including the implementation of EJB components, resources object access control and asynchronous message sending.
最后,详细介绍了子系统中主要功能的实现方法,包括EJB组件的实现、资源对象访问控制的实现和异步消息发送的实现等内容。
The thesis dissertates access control policies and access control implementations, analyzes military security model and object protection in databases.
本文讨论了存取控制的策略、实现方法,分析了军用安全模型和数据库中的对象保护技术。
The object of wireless media access control technology is to improve the system throughput, ensure fairness and reliability and reduce access delay.
无线媒体接入控制技术,以提高系统吞吐率、保证公平性和可靠性、降低接入时延为主要目标。
Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.
采用消息过滤算法可以在支持对象模型的多级安全系统中实现强制访问控制。
In the model an associated object was presented, so the permissions can be obtained through roles and objects. The access control processes were described with the description logic.
模型引入客体与客体的关联,使得权限既可以通过角色也可以通过客体获得,并采用描述逻辑对模型访问控制过程进行了形式化描述。
To fix the problem, someone with Full Control access to the document or workbook must change the default permission Settings to allow programmatic access to the object model.
要解决此问题,必须由某位对于该文档或工作簿具有“完全控制”访问权限的用户对默认权限设置进行更改,以允许通过编程的方式访问该对象模型。
This resolving scheme is based on advanced J2EE platform, applies MVC pattern, Session Facade pattern and Data Access Object pattern to control E-mail from two directions of sending and receiving.
该解决方案架构在先进的J2EE平台之上,应用MVC模式、会话模式和在数据访问对象模式等J2EE开发模式,从收和发两个方向对电子邮件进行了有效控制。
Propose an object-oriented and formal access control model for developers to design security mechanism of systems and for users to perform their duties securely and efficiently.
采用对象技术提出了一个通用的访问控制模型,提供应用级的访问控制机制和安全管理方法。
This paper describes the access control method for the specific relational-object data structure on the base of the self-developed spatial database, VISTA.
论文在自主开发的空间数据库VISTA的基础上针对特定的对象-关系型数据结构,提出了相应的访问控制方法。
However, RBAC and GRBAC are difficult to meet dynamic access control requirements because they are essentially established on the static subject-object view.
然而,RBAC和GRBAC本质上是建立在静态的主体-客体访问控制思想之上的,难以满足动态访问控制的要求。
To keep independent object-oriented system secure from Trojan horse, there exists already a restrictive policy that blends information flow control with discretionary access control.
描述了面向对象系统的数据模型,研究了信息流和信息传输,并以此为基础给出了基于自主访问控制策略的分布式对象系统的信息流控制方法。
Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control.
利用对象的继承特性引入细粒度权限管理的概念,把资源的控制从菜单粒度分解到原子操作粒度。
Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control.
利用对象的继承特性引入细粒度权限管理的概念,把资源的控制从菜单粒度分解到原子操作粒度。
应用推荐