• Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.

    J2EE应用程序可以基于这些角色定义命名安全角色约束资源访问

    youdao

  • Within the J2EE application, you can define and name security roles and constrain resource access based on those roles.

    J2EE应用程序可以基于这些角色定义命名安全角色约束资源访问

    youdao

  • These decisions are made based on security roles.

    根据安全角色作出此类决定

    youdao

  • V4 conforms to the J2EE 1.2 authorization model, which is based on security roles rather than method groups.

    V 4符合J2EE 1.2基于安全性角色不是方法授权模型

    youdao

  • Determining the roles at your site that require access to WebSphere MQ commands, and then implementing role-based security can provide a way to group the commands.

    首先确定网站上需要访问WebSphereMQ命令然后实现基于角色安全性,从而对命令进行分组

    youdao

  • As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.

    作为基于标签访问控制(LBAC)的DB 2 Viper 2数据库角色增强一部分可以对一个角色授予收回安全标签豁免权

    youdao

  • The system used authority management based on resource roles to enhance the security.

    安全方面,系统采用基于资源角色权限管理增强系统运行的安全性。

    youdao

  • The system used authority management based on resource roles to enhance the security.

    安全方面,系统采用基于资源角色权限管理增强系统运行的安全性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定