This paper introduces the overall structure of the authorization system of air zone for Guang…
介绍广西人工影响天气作业空域报批系统的总体结构及各子系统的功能。
It is an urgent problem to evaluate the IPO company for underwriting business of investment banking under the authorization system.
核准制下如何对申请IPO企业进行综合评估是当前投资银行承销业务中的一项迫切需要解决的问题。
Peer to peer trust model is used in the authorization system, and the trust relationship among entities in grid environment is assessed with trust degree.
系统采用平等信任模型,通过信任度评估网格实体之间的信任关系。
Privileges, privilege groups, privilege sets and ACLs form the basis of the authorization system of IBM DB2 CM and are discussed in further detail later in the article.
权限、权限组、权限集合和ACL形成了IBMDB 2CM授权系统的基本结构,本文后面将详细讨论。
This paper introduces the overall structure of the authorization system of air zone for Guangxi weather modification operation and the function of various subsystems.
介绍广西人工影响天气作业空域报批系统的总体结构及各子系统的功能。
This command USES the values found in the database manager configuration file and the authorization system catalog view (SYSCAT.DBAUTH). Listing 5 shows the results of issuing the command.
这个命令使用在数据库管理器配置文件和授权系统编目视图(SYSCAT.DBAUTH)中找到的值。
The solution should implement some type of authentication system to understand who is asking for a resource and an authorization system to decide whether the access should be granted.
此解决方案应该实现某种类型的身份验证系统来理解谁正在请求一个资源,并实现一个授权系统来决定是否向其授予访问权。
The "tiny little" authentication and authorization system for this "tiny little" blog application is now in place.
这个“微型”博客应用程序的“微型”身份验证和授权系统现在已经初具雏形。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
This is how we can easily limit who can even connect to a system over SSL, even if the server side components don't provide authorization.
通过这种方式我们就可以轻松地限制谁能通过SSL连接到系统,即使服务器端组件不提供授权。
If you have Authorization, then the person requesting access needs to be authorized to access the system.
如果您具有授权,则需要对请求访问的人进行授权以访问系统。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
There is one area where fine-grained authorization models are ubiquitous and well-understood: the operating system.
存在这样一个区域,其中细粒度授权模型是普遍存在的和众所周知的:即操作系统。
This is how you can easily limit who can connect to a system over SSL -- even if the server side components don’t provide authorization.
通过这种方式可以轻松地限制谁能通过SSL连接到系统,即使服务器端组件不提供授权。
As mentioned earlier, no single system catalog view contains all the available authorization data.
如前所述,没有哪个单独的系统编目视图可以包含所有可用的授权数据。
Given that SAML is a multi-party authentication and authorization system, it's possible for a valid participant in an SAML transaction to use the information maliciously in another transaction.
既然SAML是一种多方验证和授权系统,一个SAML事务中的合法参与者就有可能是用对其他事务有威胁的信息。
This pattern provides a more granular level of authorization than is typically provided by J2EE role-based authorization, getting down to the level of an individual object within a system.
与J2EE基于角色的授权通常提供的授权相比,此模式提供了更细粒度的授权,可以一直细化到项目内的单个对象的级别。
System authorization ID: This is the authorization ID representing the user who establishes a database connection.
系统授权id:这是表示建立数据库连接的用户的授权id。
The flowchart in Figure 8 summarizes how the hierarchy of authorization takes place while a user tries to create an item in the CM system.
图8所示的流程图总结了当用户试图在CM系统中创建项目时,授权机制如何发挥作用。
The attribute specifies the level of authentication required to be performed on the system authorization ID during the establishment of the connection.
该属性指定在连接建立期间需要对系统授权ID进行的身份验证级别。
Authentication and Authorization extend the Equinox security model to allow for security in a distributed system.
扩充了Equinox安全模型的认证和授权将增强分布式系统的安全性。
Kerberos also provides a system for authorization in the form of administering tokens or credentials.
Kerberos还以管理令牌或凭据的形式提供了一种授权系统。
The provider class interfaces with the system of your choice for managing transaction authorization.
这个provider类与管理事务授权的系统进行交互。
I built the domain aspects of the application last month, so what's left is to integrate it with Twitter's authorization system and then display the corresponding retrieved data.
上个月我建立了应用程序的域方面,那么剩下的将会把其与Twitter的授权系统集成在一起,然后显示相应的已检索数据。
The centralized authorization daemon named pdosd then participates in all authorization decisions when a system call is made.
然后名为pdosd的集中授权后台进程在系统调用时参与所有授权决策。
The basic WSTK identity service is used for authorization (if a user exists and the password matches they are authorized to use the system).
基本的WSTK标识服务用来进行授权(如果用户存在且与密码匹配,他们将被授权使用系统)。
It is possible that the offending client could even be authorized to use your system, but is trying to exploit that authorization in some inappropriate way.
这些攻击型的客户甚至可能是经过授权可以使用您的系统的用户,但却试图以一种不适当的方式来利用这种授权。
Once such authorization number is obtained and entered into the system, at what point should this process be restarted or continued?
一旦该认证码被获得并输入到系统中,这个流程应该从何处重新开始或继续呢?
Once such authorization number is obtained and entered into the system, at what point should this process be restarted or continued?
一旦该认证码被获得并输入到系统中,这个流程应该从何处重新开始或继续呢?
应用推荐