• Security constraints are similar to "GRANT" statements in the database.

    安全性约束类似于数据库中的GRANT语句

    youdao

  • Next, define the security constraints on directories, as shown in Listing 8.

    接下来定义目录安全约束如清单8

    youdao

  • Enter the location of the war file that you want to add security constraints to.

    输入希望添加安全性约束war文件位置

    youdao

  • After you create the role, click on the Security constraints TAB in the editor.

    创建角色之后单击编辑器中的Security constraints标签

    youdao

  • The security constraints and conditions are attached to the implementation artifacts.

    安全约束条件附加实现构件的。

    youdao

  • We focus on the research of query modification by applying security constraints.

    本文重点研究多级安全环境下,利用约束处理来实现查询处理的方法。

    youdao

  • This element describes the collection of pages to be secured and associated security constraints.

    元素描述保护页面集合关联安全约束

    youdao

  • We are going to use the Application Server Toolkit (ASTK) to modify the sample war file to add security constraints.

    我们使用应用服务器工具集(Application Server Toolkit,ASTK)修改示例war文件增加安全性约束

    youdao

  • In this method conditions for security constraints are calculated off-line and overload limits are checked on-line.

    安全性约束方法中的条件计算脱线上线过载限制检查

    youdao

  • Weak network configuration and security constraints have great impact on the bid and bargain of regional electricity market.

    网架结构薄弱安全约束问题影响区域市场交易重要因素。

    youdao

  • The declarative method involves adding security constraints through the web.xml file and through the application server-specific deployment files.

    声明方法需要通过web. xml文件应用程序服务器特定的部署文件,来添加安全约束

    youdao

  • The second step is to configure the resources to apply security constraints. Three separate configuration Settings are defined in these stanzas, as follows.

    第二配置资源应用安全约束

    youdao

  • One way to do this is to provide an additional web service layer that filters out forbidden web service requests and supplies logging and security constraints.

    种方法提供另外Web服务过滤禁用的 Web 服务请求提供登录安全约束。

    youdao

  • Security constraints are consistent by modifying security constraint definition, and an effective classification assignment algorithm is given in this paper.

    通过修改安全约束定义,使得安全约束之间始终协调的,并给出一种高效密级分配算法

    youdao

  • Services-config.xml: the top-level configuration file that references the other configuration files and also provides security constraints, channels, and logging.

    services - config . xml:引用其他配置文件提供安全约束通道日志记录顶级配置文件

    youdao

  • If you're going to expose services to external users, you need some kind of security constraints that make sure that only authorized users can access the services.

    如果准备外部用户公开服务需要某种安全约束保证只有授权的用户才能访问服务。

    youdao

  • Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.

    通过部署描述符中的安全约束可以应用程序资源(ejb方法web页)声明需要授权才能进行访问

    youdao

  • Optimal power flow model is established based on minimizing operation cost, optimal power flow sensitivities is obtained by effective set of security constraints.

    该方法社会效益最大化目标函数建立潮流模型,根据有效约束得到最优潮流灵敏度系数。

    youdao

  • You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.

    根据web. xml文件指定安全性约束通常定义一个多个角色这些角色的用户拥有访问这些脚本适当权限

    youdao

  • Within such a platform, enforcing security constraints between applications and between application tenants is a critical requirement and Tivoli Access Manager can play a key role.

    此类平台中,在应用程序应用程序租户之间实施安全约束关键需求TivoliAccessManager能够扮演这个关键角色。

    youdao

  • Each role must be defined in the deployment descriptor of each Web or enterprise application, and security constraints must be created to secure each authorization-controlled resource.

    必须每个Web企业应用程序部署描述符定义每个角色,并且必须创建安全约束保护每个授权控制的资源

    youdao

  • The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.

    这个主体作为J2EE上下文来建立的,所以我们可以确保服务实现中定义安全性约束分派组件之前得到满足。

    youdao

  • Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.

    方法权限安全性角色映射特定EJB方法安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合HTTp方法URL模式的一个组合

    youdao

  • The authors analyze the characteristics of constraints in bidding algorithm and focuses on time constraints and security constraints. Mathematics method to handle these constraints is also discussed.

    分析竞价算法各类约束特点重点时间约束网络约束,处理这些约束的数学方法进行了探讨。

    youdao

  • J2EE security roles and constraints are added to the deployment descriptor of the application.

    可将J2EE安全角色约束添加应用程序部署描述符

    youdao

  • First, you can use constraints to enhance security posture to threshold policies.

    首先可以使用约束增强阀值策略安全处理。

    youdao

  • My understanding is that when such constraints appear, developers typically abandon J2EE security and start writing code for themselves.

    理解出现这类约束时,开发人员通常会放弃J2EE安全开始自己编写代码

    youdao

  • A guide to building supplementary specifications surrounding security, including sample business rules and common constraints.

    构建补充规约环境安全指南包括商业规则例子一般的约束

    youdao

  • You now have the three GBeans and the realm set up, and your security roles and constraints are defined.

    现在已经设置三个GBeans领域并且定义安全角色约束

    youdao

  • You now have the three GBeans and the realm set up, and your security roles and constraints are defined.

    现在已经设置三个GBeans领域并且定义安全角色约束

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定