Role-based access control (RBAC)
基于角色的访问控制 (RBAC)
基于IP的访问控制。
We won't cover setting up role-based access.
我们将不介绍如何设置基于角色的访问。
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
Authorization constraint is an important part in role-based access control models.
授权约束是基于角色的访问控制模型中一个非常重要的部分。
The system adopts the Role Based Access Control to ensure the security of the system.
系统采用了基于角色的访问控制策略,进一步保证了系统的安全。
DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.
DB 2提供了基于标签的访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性。
For queries that do not match any guideline, the regular cost-based access plan is chosen.
对于不与任何准则匹配的查询,将选择常规的基于成本的访问计划。
Access plans can change based on accumulated data.
访问计划可以根据累积的数据进行更改。
The process engine provides secure (role based) access to critical process data.
处理引擎提供了对关键流程数据的安全(基于角色)访问。
However, each access method presents unique challenges, based on a given scenario.
然而,面对某种给定的场景,每种访问方法都呈现着其特有的挑战。
Business space is a secure web application that supports role based authentication and access.
业务空间是一种安全的web应用程序,它支持基于角色的验证和访问。
Role based facility for governance and access control.
基于角色、用于用户治理和访问控制的设施。
Generation of mobile networks, which will offer high-speed Internet access based on.
因特网接入能力的下一代移动网络将建立考虑到这一点。
One key technology for the service-based Web is SOAP, the Simple Object Access Protocol.
用于该基于服务的Web的一个关键性技术是SOAP——简单对象访问协议。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
Our clients take advantage of both role-based permission and fine-grained access control.
我们的客户同时利用基于角色的权限和细粒度访问控制。
The concept of an access token is very similar to label-based authorization controls.
访问标志的概念非常类似于基于标签的授权控制。
You can access both the dynamic as well as the content-based help.
您可以访问动态和基于内容的帮助。
Allow network access based on white-list approach only.
只按白名单方式允许网络访问。
You can use any Domino URLs to access Domino-based data.
可以使用任何DominoURL来访问基于Domino 的数据。
But a group called Access, based in New York, is trying to overcome that.
但是一个名叫“连通”(Access)的纽约团队正在解决这个问题。
Code access security is a stack-based algorithm.
代码访问安全是一个基于堆栈的算法。
In this paper, an Area Access Control System based on RFID technology has been introduced.
本文介绍了一种基于RFID技术的小区门禁系统。
Test centers that do not have Internet access offer the Paper-based Test.
而没有互联网接入的测试中心则提供纸质测试。 。
Most previous secret sharing schemes are based on the special access structure of threshold.
已有的多数秘密分享方案是基于特殊的门限接入结构。
This paper describes three grid access control models based on different current model.
文中将讨论三种基于不同方式的网格访问控制模型。
The problem of distributed key generation based on vector space access structures is studied.
本文对基于向量空间接入结构的分布式密钥生成进行了研究。
The problem of distributed key generation based on vector space access structures is studied.
本文对基于向量空间接入结构的分布式密钥生成进行了研究。
应用推荐