For example, a trusted context could have a default role, ROLE_A.
例如,一个可信上下文可能有一个默认角色ROLE_A。
This puts you in the role of a trusted advisor who can observe and analyze business strategies and decisions as they occur.
这使您成为一个受信任的顾问,能够在业务战略和决策出现时对其进行观察和分析。
This means that the privileges of the default role associated with the trusted context are available to any individual who USES a trusted connection as defined by the trusted context.
这意味着与可信上下文关联的默认角色的特权可用于使用有可信上下文定义的可信连接的任何个人。
When employees are trusted to play an active role in their organization’s leadership, they’ll naturally respond by taking a personal interest in the quality of their work.
当雇员被信任,在各自的部分中发挥积极作用的时候,他们自然会把提高工作质量看成是自己的事。
To be more explicit, while brand advertisers have historically trusted people as consumers, they do not trust them in the new role of producer (e.g. uncontrollable content).
说的更明确一些,尽管在历史上,品牌广告商对于消费者具有信任,但对于同样的人群,把他们作为广告制作者,他们并不信任(例如对内容无法控制)。
Irrespective of whether or not the architect role is fulfilled by a team, it is often the case that an architect is supported by a number of "trusted advisors."
无论构架师的角色被一个人还是一个小组担当,他们背后都有“值得信赖的顾问”的支持。
In traditional society people trusted that moral played a key role in state's organism, so moral education also played a great, even decisive role in social cultivation and social stability.
在传统社会,由于道德在国家建制中举足轻重,道德教育在社会教化和维护社会稳定方面有着重要甚至决定性作用。
In the trade of e-business the trusted third party (TTP) plays an important role in order to avoid trade disavowing and to ensure the square deal.
在电子商务交易中,为了防止交易抵赖,保证买卖双方在交易时的公平性,可信任的第三方(简称ttp)担任着重要的角色。
The process that fills this role is often not trusted or seen as worthy of attention, for when we do engage it, we may make mistakes in perception or in decision making.
它的意见通常被认为是不可信或不值得被关注的,若我们当真了,倒是会形成错觉或做出错误的决定。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
应用推荐