It is generally a fairly coarse-grained form of security that deals with access to functional areas of the system, perhaps defined by URLs or method calls on an EJB component.
总的说来,这是一种非常粗粒度的安全形式,用于处理对系统的功能领域的访问,可以由url或对EJB组件的方法调用进行定义。
IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.
IDSLBACREADSET:要访问数据,用户安全标签的每个集合组件必须包括数据安全标签的集合组件。
IDSLBACREADARRAY: Each array component of the user security label must be greater than or equal to the array component of the data security label to allow access to data.
IDSLBACREADARRAY:要访问数据,用户安全标签的每个数组组件必须大于或等于数据安全标签的数组组件。
IDSLBACWRITEARRAY: Each array component of the user security label must be equal to the array component of the data security label to allow access to data.
IDSLBACWRITEARRAY:要访问数据,用户安全标签的每个数组组件必须等于数据安全标签的数组组件。
Next we'll define the security roles for security roles are named sets of users that will have access to secure resources (like a servlet, JSP, EJB or SCA component) and methods.
接下来,我们将定义安全角色。安全角色是具有安全资源(如servlet、JSP、EJB或SCA组件)及方法的访问权限的命名用户集。
Tivoli access Manager WebSEAL server: a security proxy component that enforces access to web servers and manages the web space centrally, linking all web servers into one logical web space.
TivoliAccessManagerWebSEALServer:一个安全代理组件,它实现对web服务器的访问和集中管理web空间,将所有web服务器链接到一个逻辑web空间。
As shown in Figure 11, we have defined "Security identity" on the CreateEmployee component by defining a role called "Payroll access".
如图11所示,我们已经在CreateEmployee组件上通过一个名为“Payroll access”角色的身份定义了“安全身份”。
IDSLBACWRITESET: Each set component of the user security label must include the set component of the data security label to allow access to data.
IDSLBACWRITESET:要访问数据,用户安全标签的每个集合组件必须包括数据安全标签的集合组件。
Notice that you can choose, for the security identity, a role not authorized to access the SCA component.
请注意,可以为安全标识选择未授权访问SCA组件的角色。
The Solaris 10 operating system provides mandatory access controls through its security-enhanced Trusted Extensions component.
Solaris10操作系统通过其增强了安全性的 TrustedExtensions 组件提供了强制访问控制。
Access control is an important component of network security, E-Govment in the protection of information integrity, confidentiality and availability play an important role.
访问控制是网络安全的一个重要组成部分,在保障电子政务信息的完整性、保密性和可用性方面发挥着重要作用。
This paper puts forward a grid architecture based on component technology, and gives detailed descriptions on the components support environment, user access gateway and security management.
提出了一种基于组件技术的网格环境架构,并对其中的组件支撑环境、用户访问网关及安全管理等方面进行了详细描述。
It is generally a fairly coarse -grained form of security that deals with access to functional areas of the system, perhaps defined by URLs or method calls on an EJB component.
总的说来,这是一种非常粗粒度的安全形式,用于处理对系统的功能领域的访问,可以由url或对EJB组件的方法调用进行定义。
Background management component include: library management, order management, membership management, security management, web site management and access statistics.
后台管理部分包括:图书管理、订单管理、会员管理、安全管理、网站管理和访问统计等。
The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.
它是保证网络安全的核心策略之一,也是信息安全技术的重要组成部分。
Social protection is a basic component of decent work. The objective of most social protection schemes is to provide access to health care and income security.
社会保护性也是“可敬的工作”的一个基本构成部分,大多数社会保护计划方案的目标就是为社会提供医疗护理和收入安全保障。
Social protection is a basic component of decent work. The objective of most social protection schemes is to provide access to health care and income security.
社会保护性也是“可敬的工作”的一个基本构成部分,大多数社会保护计划方案的目标就是为社会提供医疗护理和收入安全保障。
应用推荐