Here is the authorization model for this virtual campus application.
下面是此虚拟校园应用程序的授权模型。
V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.
V 4符合J2EE 1.2基于安全性角色而不是方法组的授权模型。
The example authorization model is very simple in that it only defines a single permission, the entry permission.
示例授权模型非常简单,它只定义单个权限,即登录权限。
The authorization model of a WebSphere Commerce application has three primary concepts: users, actions, and resources.
WebSphereCommerce应用程序的授权模型有三个主要概念:用户、操作和资源。
Static SQL can provide more consistent or even better performance and a better authorization model for DB2 applications.
静态SQL能够提供更加一致或者甚至更好的性能,以及更好的DB 2应用程序授权模型。
This paper proposes a new dynamic authorization model based on feedback mechanism to solve static state of mechanisms.
在此基础上提出一种基于反馈机制的动态授权新模型,很好地解决了现有授权系统的静态性的缺点。
In contrast, the user-centric authorization model of JAAS was developed with the idea of protecting the world from the user.
相反,JAAS的以用户为中心的认证模型是以保护世界不受用户影响的思路开发的。
Based on this provisional authorization model, several problems of XML access control technology are discussed in detail.
在此临时授权模型基础之上,我们详细讨论了XML访问控制的若干技术问题。
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
After importing authorization and mutable attribute, the usage control authorization model is characterized with a new feature.
通过引入授权和可变属性,使用控制授权模型具有了新的特性。
In this final leg of the tour, you'll learn about a discrepancy in the JAAS authorization model and I'll describe a practical method for addressing it.
在本导游的最后一程,将介绍JAAS认证模型中的一个矛盾,并且我将描述一个解决它的实际方法。
I've documented a discrepancy in the JAAS authorization model and also described a practical workaround, offering a real-world implementation as its example.
我介绍了JAAS授权模型中的一个矛盾之处,并描述了一种解决它的实用方法,并提供了它的现实世界实现的一个例子。
We need to be able to store configurable information with each printer, but we don't really have anywhere to put it within the standard J2EE authorization model.
我们需要能够存储与每台打印机对应的可配置信息,但在标准J2EE授权模式中,实际上却没有任何地方能够放置此类信息。
An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the access control technique of RBAC.
从身份认证和访问控制入手,结合PKI和RBAC技术,提出了一种针对电子病历的基于身份的授权模型。
And a WFMS authorization model based on role control and time constraints is constructed, and how it meets the desires of least privilege and separation of duty is discussed.
构建了一个带有时间约束的基于角色的工作流系统授权模型,分析该模型对最小权限和责任分离要求的满足情况。
I do not know yet what they will look like, but I do know that if we treat them as nothing more than extensions of the queue authorization model, the "best" practice will be wrong.
我还不知道它们将是什么样子,但是我知道,如果我们将它们简单视为队列授权模型的扩展,则该“最佳”实践将是错误的。
Access control within the portal domain is not based on the J2EE authorization model, because it is not powerful enough to be a viable solution for the portal authorization domain.
门户域中的访问控制没有基于J2EE授权模型,因为它不够强大,不足以成为可行的门户授权域解决方案。
To sum up, the scope of an ACL is at least the resource it secures, however the scope can be extended by an application in order to implement a designer's desired authorization model.
总之,ACL的范围至少是它保护的资源,不过,应用程序可以扩展该范围,以实现设计人员所需的授权模型。
This article continues with the virtual campus scenario, used to illustrate the earlier articles in the series, to show how a complex authorization model can be implemented through EAz.
本文将继续介绍虚拟校园场景,用于对本系列前面的文章进行阐述,说明如何通过EAz实现复杂的授权模型。
Under trend of dynamically constructing service grid virtual organization to solve coordinated work question, a delegation authorization model for service grid workflow is proposed.
在动态构建服务网格虚拟组织以协同问题求解的新趋势下,提出了一种服务网格工作流委托授权模型。
Authorization defined by the enterprise security model.
由企业安全模型定义的授权。
The model minimizes the risk of tampering with the authorization data so that servers do not spend more time in verifying the data.
这个模型将篡改授权数据的风险降至了最低,因此服务器不用花费大量的时间来验证数据了。
Also in this model, authorization data has been separated from the authentication information so authorization data should not be embedded in authentication tickets.
而且,在这个模型中,授权数据已经与认证数据分隔开了,这样,授权数据就应该不用嵌入认证令牌中了。
Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.
当使用EJB安全模型调用服务实现、会话ejb时,将实现授权处理。
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
文中还介绍了DB 2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
Authorization can be scaled by using a distributed, federated model.
授权可以用分布式、联邦式的模型来解决升级问题。
The sections above described how you can model authorization rules, by defining what staff verb applies, and which input parameters it will receive to execute that rule at run time.
以上各节通过定义应用什么人员谓词,它在运行时接收哪些输入参数来执行该规则,描述了如何建模授权规则。
Figure 5 shows the details of this TAB, where you can model an authorization rule.
图5显示了此选项卡的详细信息,您可以在该选项卡中建模一个授权规则。
Figure 5 shows the details of this TAB, where you can model an authorization rule.
图5显示了此选项卡的详细信息,您可以在该选项卡中建模一个授权规则。
应用推荐