• Here is the authorization model for this virtual campus application.

    下面虚拟校园应用程序授权模型

    youdao

  • V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.

    V 4符合J2EE 1.2基于安全性角色不是方法授权模型

    youdao

  • The example authorization model is very simple in that it only defines a single permission, the entry permission.

    示例授权模型非常简单定义单个权限登录权限。

    youdao

  • The authorization model of a WebSphere Commerce application has three primary concepts: users, actions, and resources.

    WebSphereCommerce应用程序授权模型三个主要概念用户操作资源

    youdao

  • Static SQL can provide more consistent or even better performance and a better authorization model for DB2 applications.

    静态SQL能够提供更加一致或者甚至更好性能以及更好DB 2应用程序授权模型

    youdao

  • This paper proposes a new dynamic authorization model based on feedback mechanism to solve static state of mechanisms.

    基础上提出一种基于反馈机制动态授权模型,很好解决了现有授权系统的静态性的缺点。

    youdao

  • In contrast, the user-centric authorization model of JAAS was developed with the idea of protecting the world from the user.

    相反JAAS用户为中心认证模型是以保护世界不受用户影响的思路开发的。

    youdao

  • Based on this provisional authorization model, several problems of XML access control technology are discussed in detail.

    临时授权模型基础之上,我们详细讨论了XML访问控制若干技术问题

    youdao

  • Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.

    安全性更改另一个主要方面,它体现在WebSphere安全性授权模型基于角色安全性的转变中。

    youdao

  • After importing authorization and mutable attribute, the usage control authorization model is characterized with a new feature.

    通过引入授权可变属性使用控制授权模型具有新的特性。

    youdao

  • In this final leg of the tour, you'll learn about a discrepancy in the JAAS authorization model and I'll describe a practical method for addressing it.

    导游最后一程介绍JAAS认证模型中的矛盾并且描述一个解决实际方法

    youdao

  • I've documented a discrepancy in the JAAS authorization model and also described a practical workaround, offering a real-world implementation as its example.

    介绍了JAAS授权模型中的矛盾之处,描述了一种解决实用方法,并提供了它的现实世界实现的一个例子

    youdao

  • We need to be able to store configurable information with each printer, but we don't really have anywhere to put it within the standard J2EE authorization model.

    我们需要能够存储台打印机对应的可配置信息标准J2EE授权模式中,实际上没有任何地方能够放置此类信息。

    youdao

  • An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.

    身份认证访问控制入手,结合PKIRBAC技术提出种针对电子病历的基于身份授权模型

    youdao

  • And a WFMS authorization model based on role control and time constraints is constructed, and how it meets the desires of least privilege and separation of duty is discussed.

    构建了个带有时间约束基于角色工作流系统授权模型分析模型最小权限责任分离要求满足情况

    youdao

  • I do not know yet what they will look like, but I do know that if we treat them as nothing more than extensions of the queue authorization model, the "best" practice will be wrong.

    知道它们是什么样子但是我知道,如果我们它们简单视为队列授权模型扩展,则最佳实践错误的。

    youdao

  • Access control within the portal domain is not based on the J2EE authorization model, because it is not powerful enough to be a viable solution for the portal authorization domain.

    门户域中访问控制没有基于J2EE授权模型因为不够强大不足以成为可行的门户授权域解决方案。

    youdao

  • To sum up, the scope of an ACL is at least the resource it secures, however the scope can be extended by an application in order to implement a designer's desired authorization model.

    总之ACL范围至少保护资源不过,应用程序可以扩展范围,实现设计人员所需的授权模型。

    youdao

  • This article continues with the virtual campus scenario, used to illustrate the earlier articles in the series, to show how a complex authorization model can be implemented through EAz.

    本文继续介绍虚拟校园场景用于对本系列前面文章进行阐述,说明如何通过EAz实现复杂授权模型

    youdao

  • Under trend of dynamically constructing service grid virtual organization to solve coordinated work question, a delegation authorization model for service grid workflow is proposed.

    动态构建服务网格虚拟组织协同问题求解新趋势下,提出了一种服务网格工作流委托授权模型

    youdao

  • Authorization defined by the enterprise security model.

    企业安全模型定义授权

    youdao

  • The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.

    这个模型篡改授权数据风险至了最低,因此服务器不用花费大量的时间验证数据了。

    youdao

  • Also in this model, authorization data has been separated from the authentication information so authorization data should not be embedded in authentication tickets.

    而且这个模型授权数据已经认证数据分隔开了,这样,授权数据就应该不用嵌入认证令牌中了。

    youdao

  • Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.

    使用EJB安全模型调用服务实现会话ejb时,将实现授权处理

    youdao

  • Both the DB2 and IDS security model consist of two main components: authentication and authorization.

    DB2IDS安全模型两个主要组件组成身份验证授权

    youdao

  • It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.

    文中介绍DB 2UDB安全模型包括用户身份验证、用户授权以及超级用户。

    youdao

  • Authorization can be scaled by using a distributed, federated model.

    授权可以分布式联邦式模型来解决升级问题。

    youdao

  • The sections above described how you can model authorization rules, by defining what staff verb applies, and which input parameters it will receive to execute that rule at run time.

    以上通过定义应用什么人员谓词运行接收哪些输入参数执行规则描述了如何建模授权规则

    youdao

  • Figure 5 shows the details of this TAB, where you can model an authorization rule.

    5显示选项详细信息可以在该选项卡中建模一个授权规则。

    youdao

  • Figure 5 shows the details of this TAB, where you can model an authorization rule.

    5显示选项详细信息可以在该选项卡中建模一个授权规则。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定