Figure 7: Access control for RAM can be configured to allow the same user to have multiple roles across multiple communities with varying permissions and constraints.
图7:可以将RAM的访问控制配置为,允许同一个用户在多个社区中扮演拥有各不相同的权限和约束的多个角色。
Having the constraints defined in the database allows DB2 to know relationships between tables and in some cases allows it to select better access plans based on that knowledge.
在数据库中定义约束使DB 2可以知道表之间的关系,并且在某些情况下允许DB 2根据这样的知识选择更好的访问计划。
If you're going to expose services to external users, you need some kind of security constraints that make sure that only authorized users can access the services.
如果准备向外部用户公开服务,您需要某种安全约束来保证只有授权的用户才能访问服务。
Sometimes certain requirements or constraints on the access to the service itself — including authentication, integrity, and confidentiality requirements — are needed by a client run time.
客户机运行时有时需要某些对访问服务本身的要求或约束(包括身份验证、完整性和机密性要求)。
They say gender division of labor and constraints on access for women to land also create problems.
他们说,劳动分工的性别化,以及妇女在获取土地方面受到的限制,也都是问题。
The resource kernel can then merge the requests to define a schedule to provide guaranteed access using the task-defined constraints (or return an error if they cannot be guaranteed).
然后资源内核可以合并这些请求,使用任务定义的约束定义一个调度,从而提供确定的访问(如果无法提供确定性则返回错误)。
Within such a platform, enforcing security constraints between applications and between application tenants is a critical requirement and Tivoli Access Manager can play a key role.
在此类平台中,在应用程序与应用程序租户之间实施安全约束是一个关键需求,TivoliAccessManager能够扮演这个关键角色。
Note that when modifying and adding entries using Microsoft Access, the constraints of your underlying database tables are adhered to.
注意,使用MicrosoftAccess修改和添加条目时,遵守底层数据库表的约束。
Severe resource constraints and difficult terrain limit access to health-care facilities in many parts of Nepal.
尼泊尔很多地区存在着严重的资源制约因素和不利的地形条件,这些不利因素限制了人们使用医疗设施的能力。
The only advantage provided at present is support for XPath-based constraints and access methods in the generated code.
目前这种方法所具有的唯一好处是在生成代码中支持基于XPath的约束和访问方法。
You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.
根据web. xml文件中指定的安全性约束,通常会定义一个或多个角色,这些角色的用户将拥有访问这些脚本的适当权限。
Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.
通过部署描述符中的安全约束,可以将应用程序资源(如ejb方法和web页)声明为需要授权才能进行访问。
If the application contains a mixture of secure (those with authorization constraints) and insecure servlets, the insecure servlets cannot access the session object.
如果应用程序包含安全的(具有授权约束的)和不安全的Servlet的混合体,则不安全的Servlet将无法访问会话对象。
Find and fix database problems with constraints, triggers, extents, indexes, and grants Toad utilizes direct Oracle OCI calls for full access to the Oracle API.
定位并修复数据库在约束、触发器、区(extent)和索引上的问题,同时可以让Toad直接利用OracleOCI调用获得对OracleAPI的完全访问。
Combining both types of interfaces within a single application, supporting both ways of access to the bean, may help relax design constraints.
在单个应用程序中组合这两种类型的接口来支持两种访问Bean的方式有助于减少设计约束。
The web.xml file lists constraints and security roles that exist in your application as well as the roles that are allowed access to a certain directory.
xml文件列出应用程序中存在的约束和安全角色以及允许访问某个目录的角色。
Temporal constraints are introduced in the user assignment and permission assignment to express and realize more powerful access control semantics.
在用户分配和权限分配中引入时间约束,表示和实现了更为丰富的访问控制语义。
The occiput does not easily accommodate instrumentation because of access and spatial constraints.
由于入路及空间结构的限制,对枕骨进行固定并非易事。
From table Designer, you can also right-click in the grid section to access dialog boxes through which you can create and modify relationships, constraints, indexes, and keys for the table.
从[资料表设计工具],您也可以在方格区按一下滑鼠右键,存取可用以建立和修改资料表关联性、条件约束、索引和索引键的对话方块。
This model extends the traditional RBAC model with user credentials, temporal constraints and XML document classification to enforce a content-based time-aware multi-granularity access control.
该模型从用户证书、时间约束、XML文档分类等方面对传统的RBAC模型进行了扩展,以实现基于内容的时间上下文敏感的多粒度访问控制。
In this paper, we present an access control scheme that can resolve these issues, and propose a dynamic context-aware access control model (DCAAC) which extends RBAC with context constraints.
本文提出了一个上下文感知的访问控制模型(DCAAC),D CAAC扩展了RBAC模型,增加了上下文约束。
The equipment cost is extremely high and applications are restricted to very large projects where terrain, weather, time, and access impose special constraints on traditional methods.
设备成本非常高,应用受到限制非常大的项目,地形,天气,时间,和特殊限制的传统方法。
Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).
限制可以视为是基于角色的访问控制(RBAC)的主要动机。
An index is a mechanism for providing fast access to table rows or for enforcing certain constraints.
索引是一种提供快速访问表行或强制某些约束的机制。
The teacher builds up scaffolding for learners, with the help of the random access of the hypertext to overcome the constraints of printed texts.
教师从知识传授者变成建立关联的脚手架搭建者,并通过利用计算机可随机存取的超文本特性来克服纸质材料线性呈现的局限性。
It becomes necessary to achieve an energy-efficient medium-access protocol subject to power constraints and large scale, so it is also the one of key points in the research.
由于受到传感器网络节点数量巨大和能量有限的限制,设计一种节能的MAC协议是非常必要的,也是当前此领域的研究重点之一。
It becomes necessary to achieve an energy-efficient medium-access protocol subject to power constraints and large scale, so it is also the one of key points in the research.
由于受到传感器网络节点数量巨大和能量有限的限制,设计一种节能的MAC协议是非常必要的,也是当前此领域的研究重点之一。
应用推荐