理解设计和部署安全模型的步骤。
Understanding the steps to design and deploy a security model.
SOA安全模型中的参与方。
其他操作系统则使用了更精细的安全模型。
图1是DB 2UDB安全模型的概述。
Figure 1 provides an overview of the DB2 UDB security model.
安全模型包含访问OLAP对象的规则。
The security model contains the rules for accessing OLAP objects.
静态SQL与动态sql的安全模型也不同。
The security model for static SQL is also different than for dynamic SQL.
静态SQL与动态sql的安全模型也不同。
The security model for static SQL is also different from that of dynamic SQL.
图2描述示例案例管理资产中使用的安全模型。
The diagram in Figure 2 Outlines the security model used in the sample case management asset.
重复本文中导出、导入和实施安全模型的步骤。
Repeat the steps you followed in this article to export, import, and enforce your security model.
在定义安全模型和模式时,需要考虑两个方面。
In defining security models and patterns there are two facets that need to be considered.
本文涵盖了CM安全模型所涉及的各个方面和概念。
This article touches on the various aspects and concepts of CM security model.
RM可有多种方法、以插件方式在其他安全模型中工作。
In many ways RM just plugs in with whatever other security model is already in place.
显然,您需要考虑某种安全模型以限制不可信资源的加载。
Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.
JACC为实现标准J2EE安全模型提供了良好的支持。
JACC provides good support for implementing the standard J2EE security model.
如果执行以下操作,则需要重新导出和重新导入安全模型。
You should re-export and re-import your security model if you do the following.
CubingServices安全模型包含以下元素。
The Cubing Services security model consists of the following elements.
为了保护患者隐私,PODS的设计采用一个多级安全模型。
To safeguard patient privacy, the PODS design USES a multilevel security model.
您需要在导入安全模型时选择相同的数据库,如图15所示。
You need to select the same database when you import your security model, as shown in Figure 15.
UDDI安全模型由注册中心和结点策略以及它们的实现集合定义。
The UDDI security model is defined by the set of registry and node policies and their implementations.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
它是构建在操作系统级别的一个服务层,以便扩展浏览器的安全模型。
Rather it is a layer that extends the browser’s security model down into the operating system level.
可用各种方式组合这些机制,以便用各种加密技术建立各种安全模型。
These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.
然后,用户可以在安全页面和不安全页面之间导航而不会破坏安全模型。
Then, users could navigate between secured and non-secured pages without breaking the security model.
当使用EJB安全模型调用服务实现、会话ejb时,将实现授权处理。
Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.
不过,JACC提供程序并不仅限于标准J2EE安全模型的静态特性。
However, the JACC provider is not limited by the static nature of the standard J2EE security model.
对需求最主要的安全责任是为应用程序定义一个高水平的核心安全模型。
The primary security duty of a requirements specifier is to identify at a high level the core security model for the application.
我们首先强调了安全性对分布式环境的重要性,概述了DCE安全模型。
We started with a note on the importance of security in a distributed environment and an overview of DCE security model.
由于安全模型依赖于多维数据集模型,应该首先设计和部署多维数据集模型。
Because the security model depends on the cube model, you should design and deploy the cube model before designing and deploying the security model.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
The end to end security model would mean that all providers give access to all trusted requesting applications.
状态的所有者负责发起转换,从而驱动应用程序的安全模型(也请参见图5)。
The owner of the state is responsible for initiating the transitions, so drives the security model of the application (also see Figure 5).
应用推荐