It gives you the ability to protect a resource with a defined security constraint and then define the user roles that can access the protected resource.
它向您提供使用定义的安全约束保护资源的能力,然后定义可以访问受保护资源的用户角色。
The idea of BAM everywhere is to take advantage of the "timeliness" of information as soon as the need arises without the constraint of a single access mechanism.
无处不在的BAM的基本思想是在需要一出现时就利用信息的“及时性”,而无单一访问机制的约束。
Insecurity, with the resulting lack of access to disease-endemic areas, is a major constraint, especially in countries where cases are still occurring, namely Chad, Ethiopia, Mali and South Sudan.
不安全状况会使人们难以进入疾病流行地区,这是一项主要制约因素,尤其是在那些仍然发生病例的国家,即乍得、埃塞俄比亚、马里和南苏丹。
By raising the stakes two orders of magnitude, Google hopes to find out what the killer applications will be when speed of access is no longer a constraint and capacity is effectively infinite.
谷歌希望知道,将风险提高两个数量级,连接速度将不再是个障碍,容量几乎达到无限的时候,最受欢迎的应用程序会是什么。
Note: if you need to access resources that require authentication, you can specify a second servlet mapping that is associated with a security constraint.
注意:如果您想访问需要认证的资源,那么您可以指定第二个与安全性限制相关联的servlet映射。
A class level constraint has access to the bean instance rather than one of its properties and applies some constraint logic based on several properties.
类级别的约束能获取Bean实例,而不是它的某一属性,还能应用一些基于若干属性的约束。
The downloads directory gives both registered-users and administrators access, as defined within auth-constraint tags.
downloads目录允许registered - users和administrators访问,正如auth - constraint标记中所定义的那样。
The permission propagation constraint improves the access control grain. It makes the grain reach element or attribute level.
权限传递约束提高了访问控制的粒度,使得访问控制的粒度能够达到元素或属性级。
Authorization constraint is an important part in role-based access control models.
授权约束是基于角色的访问控制模型中一个非常重要的部分。
RBAC is rather difficult to assign permissions to roles reasonably and is unable to express constraint in complicated workflow access control.
RBAC在工作流访问控制的应用中很难合理地为角色配置权限,而且无法表达复杂的工作流访问控制约束。
The traditional RBAC model cannot express complicated workflow secure access control constraint.
传统的RBAC访问控制模型已经不能表达复杂的工作流安全访问控制约束。
Whereas the formal constraint language serve as an effective complement and help testers understand the system test, and then further improve the test access rate and coverage rate of test-case.
而形式化约束语言可以对此做到有效补充,它可以帮助测试人员充分理解被测系统,进而提高测试用例的获取率以及测试覆盖率。
"The main design constraint was the need to remain sensitive to the historic landmark and the shared-access driveway that leads to parking beneath it," said the firm.
“设计的主要限制有:历史地标的呼应以及半地下车库的公共入口设计。”事务所说到。
Draw TRBAC who haves time constraint control pattern, and uniting the practice put up the system access control based on characters.
引入含有时间约束的TRBAC控制模型,结合实践构筑了系统的基于角色的访问控制。
We propose a new cryptographic key dynamic access scheme with time-constraint and can solve the problems we mentioned above.
方案能够足够灵活的处理一个层级系统中动态存取控制问题。
Owing to the symmetry constraint, only the states having magic angular momentum can get access to the graphs.
由于几何图形的对称性限制,只有幻角动量的态才可访问这些几何图形。
Owing to the symmetry constraint, only the states having magic angular momentum can get access to the graphs.
由于几何图形的对称性限制,只有幻角动量的态才可访问这些几何图形。
应用推荐