• 清单5.web . xml中的安全性约束

    Listing 5. Security constraint inside web.xml.

    youdao

  • 安全性约束方法中的条件计算脱线上线过载限制检查

    In this method conditions for security constraints are calculated off-line and overload limits are checked on-line.

    youdao

  • 这个主体作为J2EE上下文来建立的,所以我们可以确保服务实现中定义安全性约束分派组件之前得到满足。

    The principal is established as the J2EE context so that we can ensure that the security constraints that are defined on the service implementation are met before dispatching the component.

    youdao

  • 根据web. xml文件指定安全性约束通常定义一个多个角色这些角色的用户拥有访问这些脚本适当权限

    You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.

    youdao

  • SOP一种安全性约束,它实际上禁止某个URL协议/主机/端口三元组)装载页面访问来自不同源的数据

    The SOP is a security restriction that basically forbids a page loaded from a certain origin (meaning the protocol/host/port trio of the URL) to access data from a different origin.

    youdao

  • 我们使用应用服务器工具集(Application Server Toolkit,ASTK)修改示例war文件增加安全性约束

    We are going to use the Application Server Toolkit (ASTK) to modify the sample war file to add security constraints.

    youdao

  • 方法权限安全性角色映射特定EJB方法安全性约束安全性角色映射到Web资源集合中,这些Web资源集合HTTp方法和URL模式一个组合

    Method permissions map security roles to specific EJB methods and security constraints map security roles to Web resource collections that are a combination of HTTP methods and URL patterns.

    youdao

  • 接下来三个展示如何添加安全性约束8),如何设置正确URLHTTP方法(图9以及如何针对该约束允许DADXUser角色(图10)。

    The next 3 figures show how to add the security constraint (Figure 8), how to set the right URL and HTTP methods (Figure 9) and how to allow the role "DADXUser" for that constraint (Figure 10).

    youdao

  • servletweb.xml文件包含一个 <security-constraint>元素元素定义安全性约束应用的 HTTP方法以及使用约束的角色。

    The web.xml file for the servlet contains a <security-constraint> element that defines the security constraint, the HTTP methods that it applies to, and the roles that use the constraint.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引请指定传输对象

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes. Specify the object (s) to transfer.

    youdao

  • 银行预算约束存在使银行业风险监管的有效性受到了很大影响通过最低资本规定无法有效实现金融体系安全性稳定性目标。

    Soft budget constraint greatly reduced the effect of banking risk supervision, so it's not easy to realize the safety and stability of financial system only with minimum capital requirement.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 复制数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以复制表、数据存储过程引用完整性约束安全性索引

    Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 可以传输数据存储过程引用完整性约束安全性索引

    Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.

    youdao

  • 模型解决了传统基于角色访问控制中的动态适应性差最小权限约束假象问题,用于分布式工作流管理系统提高安全性实用性

    This model overcomes the weaknesses of the bad dynamic adaption and the fake constraint of the least privilege. It can enhance the security and practicability of the distributed workflow system.

    youdao

  • 同时管路布置必须满足各种各样设计约束,如安全性经济性生产加工维修保养等方面要求

    Routing of pipes should meet various design constraints or requirements for physical, economic, safety, production, operational and maintenance, etc.

    youdao

  • 资本约束如何更好地协调盈利性安全性成为我国商业银行急需解决问题

    How to better coordinate safety and profitability with the tough constraints of capital has became an urgent problems to resolve in China's commercial Banks.

    youdao

  • 车身轻量化设计参数约束的复杂系统优化问题,首先需要满足耐撞安全性

    Autobody lightweight design is an optimization procedure with multiple parameters and constraints which should firstly satisfy crashworthiness performance.

    youdao

  • 车身轻量化设计参数约束的复杂系统优化问题,首先需要满足耐撞安全性

    Autobody lightweight design is an optimization procedure with multiple parameters and constraints which should firstly satisfy crashworthiness performance.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定