One crucial factor is secure access to land.
一个关键因素是土地的安全使用。
Quickly secure access to critical information flows.
迅速获得重要信息流通的渠道。
Secure access control for services using policies is also provided.
还提供了通过策略实现的服务安全访问控制。
You have also seen how JSF and Acegi work together to secure access to bean data.
还看到了JSF和Acegi如何协作以保护对bean 数据的访问。
Allowing secure access to a VM is covered in the Security section later in this article.
本文后面的安全性一节将介绍对虚拟机的安全访问。
Protocols like SSL are supported to allow a secure access to the available cloud resources.
Libcloud也支持SSL等协议,允许对可用的云资源进行安全访问。
Moreover, secure access to the Service Registry requires configuration of an SSL connection.
此外,对ServiceRegistry的安全访问需要配置SSL连接。
A salesperson getting fast and secure access to an application that helps close a deal.
销售人员如果能够快速而且安全地访问应用程序,则有助于达成协议。
You now have the basics of your service complete, but it's essential that you secure access to it.
现在已完全拥有了服务的基础,但还有必要实现对其安全访问。
Such negotiations help guarantee safe passage for vaccination teams and secure access to children.
此类谈判有助于确保为计划免疫小分队设立安全通道,并保证使其接近儿童。
The next article in this series will demonstrate how to use Acegi to secure access to JSF's managed beans.
本系列的下一篇文章将演示如何使用Acegi保护对JSF的托管bean的访问。
Our goal will be to provide machines with secure access without requiring the need to manually provide passwords.
我们的目标将是,不需要人工提供密码就可以安全地访问机器。
The security policy 7 defines the assertions used to create a secure access channel between the TCS and the service.
安全策略7定义用于在TCS和服务之间创建一个安全访问通道的声明。
It allows end users and applications to gain secure access to any information source, regardless of where it resides.
它使最终用户和应用程序可以获得对任何信息源的安全访问,不管它在什么地方。
The current secure access control techniques in IP multicast just implemented the access control to multicast receivers.
目前针对IP组播的安全访问控制问题的解决方案只是实现了对组播接收者的访问控制。
An OpenID Relying Party, as you'll recall, is a Web site or other online resource that requires secure access to its contents.
OpenID依赖方是网站或其他在线资源,它们要求对其内容的访问是安全的。
It USES the technique you've learned in the previous couple of sections to secure access to data wrapped inside JSF managed beans.
它使用前面两节介绍的技术保护对jsf托管bean内包装的数据的访问。
It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.
本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制。
The on-demand technology reduces the cost of remote communications while providing a safe and secure access to your controller.
在随需应变技术降低成本,偏远地区通讯,同时提供一个稳妥可靠的存取控制。
Secure access to services: Enterprise beans permit various method-level security features to be declared in the deployment descriptor.
对服务的安全访问:企业beans允许在部署描述符中声明不同方法级别的安全特性。
FAO programmes assist poor households and communities to secure access to nutritionally adequate diets and reduce child undernutrition.
粮农组织的计划帮助贫穷家庭和社区获得营养充足的膳食,减轻儿童的食物不足问题。
This paper analyzes how to realize secure access control for XML documents using RBAC from aspects of role, role hierarchy, authorization, etc.
文中从角色、角色继承、授权等方面分析了如何利用RBAC实现对XML文档的安全访问控制。
Third -- and where the JDBC specification does not have any corresponding focus -- is security management for enabling secure access to back-end systems.
第三个是支持后端系统的安全访问的安全性管理,在这点上,JDBC规范并没有任何对应点。
Beyond simply providing business logic, applications must support secure access, persistence of data, transactional behavior, and other advanced features.
除了简单地提供商务逻辑之外,应用程序必须支持访问安全控制,数据持久化,事务,和其它的进阶功能。
It's important to ensure that access permissions are properly set because the OpenSSH server may refuse to use keys which have non-secure access rights.
确保正确设置访问权限非常重要,因为OpenSSH服务器可能拒绝使用具有不安全的访问权的密钥。
The framework lego/messaging architecture provides transparent and secure access to remote components: remote framework objects are treated as local objects.
框架lego/messaging架构提供对远程组件的透明和安全访问;可将远程框架对象看作是本地对象。
This paper proposed a simple and secure access control mechanism that can effectively control mobile agents updating and creating ability in native host.
本文提出了一个简单安全的存取控制机制,可以有效地控制移动代理在本地主机的更新及创建权限。
This provides more secure access than a traditional alternative: Run the Web server as root (!), with instances switching to the privilege of the file accessor.
与传统备选方法相比,这种方法提供了更安全的访问:以 root 的身份运行Web服务器,并提供转换到文件访问器权限的实例。
This provides more secure access than a traditional alternative: Run the Web server as root (!), with instances switching to the privilege of the file accessor.
与传统备选方法相比,这种方法提供了更安全的访问:以 root 的身份运行Web服务器,并提供转换到文件访问器权限的实例。
应用推荐