For example, you need to control access to EJBs using a network-safe encrypted token.
例如,您需要使用网络安全加密令牌控制对ejb的访问。
This protocol is based on current hardware foundation of Ethernet and solves access conflict through token-control by creating virtual token on application layer.
该协议基于现有的以太网硬件基础,在应用层构造虚拟令牌,利用令牌控制来解决网络的访问冲突问题。
The management mechanism regulates that a node can access the channel only when it holds a token, by which the protective mechanism with media access control can be realized.
以此为依据进行多令牌管理,规定只有持有令牌的节点才能访问信道,从而实现具有安全性保障的介质访问控制。
The role could span all web systems in portal. It was a token-based and dynamic-activated access control model, which could dynamically adjust the access rights according to user access requirement.
该模型是一个动态激活的模型,根据用户实际的访问需求动态激活相应角色,为用户管理和访问控制管理提供了一个新的解决方案。
The role could span all web systems in portal. It was a token-based and dynamic-activated access control model, which could dynamically adjust the access rights according to user access requirement.
该模型是一个动态激活的模型,根据用户实际的访问需求动态激活相应角色,为用户管理和访问控制管理提供了一个新的解决方案。
应用推荐