• This paper introduces the overall structure of the authorization system of air zone for Guang…

    介绍广西人工影响天气作业空域报批系统总体结构及各子系统的功能。

    youdao

  • It is an urgent problem to evaluate the IPO company for underwriting business of investment banking under the authorization system.

    核准制下如何对申请IPO企业进行综合评估当前投资银行承销业务中的一项迫切需要解决问题

    youdao

  • Peer to peer trust model is used in the authorization system, and the trust relationship among entities in grid environment is assessed with trust degree.

    系统采用平等信任模型通过信任度评估网格实体之间信任关系

    youdao

  • Privileges, privilege groups, privilege sets and ACLs form the basis of the authorization system of IBM DB2 CM and are discussed in further detail later in the article.

    权限权限、权限集合ACL形成IBMDB 2CM授权系统基本结构,本文后面详细讨论

    youdao

  • This paper introduces the overall structure of the authorization system of air zone for Guangxi weather modification operation and the function of various subsystems.

    介绍广西人工影响天气作业空域报批系统总体结构子系统功能

    youdao

  • This command USES the values found in the database manager configuration file and the authorization system catalog view (SYSCAT.DBAUTH). Listing 5 shows the results of issuing the command.

    这个命令使用数据库管理器配置文件授权系统编目视图(SYSCAT.DBAUTH)中找到

    youdao

  • The solution should implement some type of authentication system to understand who is asking for a resource and an authorization system to decide whether the access should be granted.

    解决方案应该实现某种类型身份验证系统理解正在请求资源实现一个授权系统来决定是否向其授予访问权。

    youdao

  • The "tiny little" authentication and authorization system for this "tiny little" blog application is now in place.

    这个微型博客应用程序“微型”身份验证授权系统现在已经初具雏形。

    youdao

  • It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.

    务必考虑系统每个层次可能访问路径同时还要考虑授权如何其他安全功能(网络级别保护)集成

    youdao

  • The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.

    授权数据那些属于系统可信计算基础服务器颁发的,因此管理域中可以认为是安全的。

    youdao

  • This is how we can easily limit who can even connect to a system over SSL, even if the server side components don't provide authorization.

    通过这种方式我们可以轻松地限制通过SSL连接系统即使服务器组件提供授权

    youdao

  • If you have Authorization, then the person requesting access needs to be authorized to access the system.

    如果具有授权需要请求访问进行授权访问系统。

    youdao

  • Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.

    相比之下授权系统用来决定已通过认证某个特定用户访问系统控制安全资源访问级别一种机制

    youdao

  • There is one area where fine-grained authorization models are ubiquitous and well-understood: the operating system.

    存在这样一个区域其中细粒度授权模型普遍存在众所周知的:即操作系统

    youdao

  • This is how you can easily limit who can connect to a system over SSL -- even if the server side components don’t provide authorization.

    通过这种方式可以轻松地限制通过SSL连接系统即使服务器组件提供授权

    youdao

  • As mentioned earlier, no single system catalog view contains all the available authorization data.

    前所述,没有哪个单独系统编目视图可以包含所有可用的授权数据。

    youdao

  • Given that SAML is a multi-party authentication and authorization system, it's possible for a valid participant in an SAML transaction to use the information maliciously in another transaction.

    既然SAML多方验证授权系统,一个SAML事务中的合法参与者可能其他事务有威胁信息

    youdao

  • This pattern provides a more granular level of authorization than is typically provided by J2EE role-based authorization, getting down to the level of an individual object within a system.

    与J2EE基于角色授权通常提供的授权相比模式提供粒度授权,可以一直细化项目内单个对象级别

    youdao

  • System authorization ID: This is the authorization ID representing the user who establishes a database connection.

    系统授权id表示建立数据库连接用户的授权id。

    youdao

  • The flowchart in Figure 8 summarizes how the hierarchy of authorization takes place while a user tries to create an item in the CM system.

    8流程图总结了当用户试图CM系统创建项目授权机制如何发挥作用。

    youdao

  • The attribute specifies the level of authentication required to be performed on the system authorization ID during the establishment of the connection.

    属性指定连接建立期间需要系统授权ID进行身份验证级别

    youdao

  • Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.

    扩充Equinox安全模型认证授权增强分布式系统安全性

    youdao

  • Kerberos also provides a system for authorization in the form of administering tokens or credentials.

    Kerberos以管理令牌凭据形式提供了一种授权系统

    youdao

  • The provider class interfaces with the system of your choice for managing transaction authorization.

    这个provider管理事务授权系统进行交互。

    youdao

  • I built the domain aspects of the application last month, so what's left is to integrate it with Twitter's authorization system and then display the corresponding retrieved data.

    上个月建立应用程序方面那么剩下会把其Twitter授权系统集成在一起,然后显示相应的已检索数据。

    youdao

  • The centralized authorization daemon named pdosd then participates in all authorization decisions when a system call is made.

    然后名为pdosd集中授权后台进程在系统调用参与所有授权决策

    youdao

  • The basic WSTK identity service is used for authorization (if a user exists and the password matches they are authorized to use the system).

    基本WSTK标识服务用来进行授权(如果用户存在密码匹配他们授权使用系统)。

    youdao

  • It is possible that the offending client could even be authorized to use your system, but is trying to exploit that authorization in some inappropriate way.

    这些攻击型客户甚至可能经过授权可以使用系统的用户,试图以一种不适当的方式来利用这种授权。

    youdao

  • Once such authorization number is obtained and entered into the system, at what point should this process be restarted or continued?

    一旦认证获得输入系统中,这个流程应该何处重新开始继续呢?

    youdao

  • Once such authorization number is obtained and entered into the system, at what point should this process be restarted or continued?

    一旦认证获得输入系统中,这个流程应该何处重新开始继续呢?

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定