Security constraints are similar to "GRANT" statements in the database.
安全性约束类似于数据库中的“GRANT”语句。
Next, define the security constraints on directories, as shown in Listing 8.
接下来,定义目录安全约束,如清单8所示。
Enter the location of the war file that you want to add security constraints to.
输入您希望添加安全性约束的war文件的位置。
After you create the role, click on the Security constraints TAB in the editor.
在创建角色之后,单击编辑器中的Security constraints标签。
The security constraints and conditions are attached to the implementation artifacts.
安全约束和条件是附加到实现构件的。
We focus on the research of query modification by applying security constraints.
本文重点研究了多级安全环境下,利用约束处理来实现查询处理的方法。
This element describes the collection of pages to be secured and associated security constraints.
该元素描述要保护的页面集合和关联的安全约束。
We are going to use the Application Server Toolkit (ASTK) to modify the sample war file to add security constraints.
我们将使用应用服务器工具集(Application Server Toolkit,ASTK)来修改示例war文件,以增加安全性约束。
In this method conditions for security constraints are calculated off-line and overload limits are checked on-line.
安全性约束在该方法中的条件来计算脱线和上线过载限制检查。
Weak network configuration and security constraints have great impact on the bid and bargain of regional electricity market.
网架结构薄弱与安全约束问题是影响区域市场交易的重要因素。
The declarative method involves adding security constraints through the web.xml file and through the application server-specific deployment files.
声明方法需要通过web. xml文件和应用程序服务器特定的部署文件,来添加安全约束。
The second step is to configure the resources to apply security constraints. Three separate configuration Settings are defined in these stanzas, as follows.
第二步是配置资源以应用安全约束。
One way to do this is to provide an additional web service layer that filters out forbidden web service requests and supplies logging and security constraints.
一种方法是提供另外的Web服务层,过滤掉禁用的 Web 服务请求,并提供登录和安全约束。
Security constraints are consistent by modifying security constraint definition, and an effective classification assignment algorithm is given in this paper.
通过修改安全约束的定义,使得安全约束之间始终是协调的,并给出一种高效的密级分配算法;
Services-config.xml: the top-level configuration file that references the other configuration files and also provides security constraints, channels, and logging.
services - config . xml:引用其他配置文件且提供安全约束、通道和日志记录的顶级配置文件。
If you're going to expose services to external users, you need some kind of security constraints that make sure that only authorized users can access the services.
如果准备向外部用户公开服务,您需要某种安全约束来保证只有授权的用户才能访问服务。
Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.
通过部署描述符中的安全约束,可以将应用程序资源(如ejb方法和web页)声明为需要授权才能进行访问。
Optimal power flow model is established based on minimizing operation cost, optimal power flow sensitivities is obtained by effective set of security constraints.
该方法以社会效益最大化为目标函数建立最优潮流模型,根据有效约束集得到最优潮流灵敏度系数。
You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.
根据web. xml文件中指定的安全性约束,通常会定义一个或多个角色,这些角色的用户将拥有访问这些脚本的适当权限。
Within such a platform, enforcing security constraints between applications and between application tenants is a critical requirement and Tivoli Access Manager can play a key role.
在此类平台中,在应用程序与应用程序租户之间实施安全约束是一个关键需求,TivoliAccessManager能够扮演这个关键角色。
Each role must be defined in the deployment descriptor of each Web or enterprise application, and security constraints must be created to secure each authorization-controlled resource.
必须在每个Web或企业应用程序的部署描述符中定义每个角色,并且必须创建安全约束来保护每个授权控制的资源。
The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.
这个主体是作为J2EE上下文来建立的,所以我们可以确保在服务实现中定义的安全性约束在分派组件之前得到满足。
Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.
方法权限将安全性角色映射到特定的EJB方法而安全性约束则将安全性角色映射到Web资源集合中,这些Web资源集合是HTTp方法和URL模式的一个组合。
The authors analyze the characteristics of constraints in bidding algorithm and focuses on time constraints and security constraints. Mathematics method to handle these constraints is also discussed.
分析了竞价算法中各类约束的特点,重点是时间约束和网络约束,并对处理这些约束的数学方法进行了探讨。
J2EE security roles and constraints are added to the deployment descriptor of the application.
可将J2EE安全角色和约束添加到应用程序的部署描述符。
First, you can use constraints to enhance security posture to threshold policies.
首先,您可以使用约束来增强阀值策略的安全处理。
My understanding is that when such constraints appear, developers typically abandon J2EE security and start writing code for themselves.
我的理解是,当出现这类约束时,开发人员通常会放弃J2EE安全而开始自己编写代码。
A guide to building supplementary specifications surrounding security, including sample business rules and common constraints.
构建补充规约环境安全的指南,包括商业规则的例子和一般的约束。
You now have the three GBeans and the realm set up, and your security roles and constraints are defined.
现在您已经设置了三个GBeans和领域,并且定义了您的安全角色和约束。
You now have the three GBeans and the realm set up, and your security roles and constraints are defined.
现在您已经设置了三个GBeans和领域,并且定义了您的安全角色和约束。
应用推荐