• 理解设计部署安全模型步骤

    Understanding the steps to design and deploy a security model.

    youdao

  • SOA安全模型中的参与方

    Participants in SOA security models.

    youdao

  • 其他操作系统则使用了更精细安全模型

    Other operating systems use more elaborate security models.

    youdao

  • 1DB 2UDB安全模型概述

    Figure 1 provides an overview of the DB2 UDB security model.

    youdao

  • 安全模型包含访问OLAP对象规则

    The security model contains the rules for accessing OLAP objects.

    youdao

  • 静态SQL动态sql安全模型不同

    The security model for static SQL is also different than for dynamic SQL.

    youdao

  • 静态SQL动态sql安全模型不同

    The security model for static SQL is also different from that of dynamic SQL.

    youdao

  • 2描述示例案例管理资产使用安全模型

    The diagram in Figure 2 Outlines the security model used in the sample case management asset.

    youdao

  • 重复本文导出导入实施安全模型步骤

    Repeat the steps you followed in this article to export, import, and enforce your security model.

    youdao

  • 定义安全模型模式时需要考虑两个方面

    In defining security models and patterns there are two facets that need to be considered.

    youdao

  • 本文涵盖CM安全模型所涉及各个方面概念

    This article touches on the various aspects and concepts of CM security model.

    youdao

  • RM可有多种方法、插件方式其他安全模型工作。

    In many ways RM just plugs in with whatever other security model is already in place.

    youdao

  • 显然需要考虑某种安全模型限制不可信资源加载

    Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.

    youdao

  • JACC实现标准J2EE安全模型提供了良好支持

    JACC provides good support for implementing the standard J2EE security model.

    youdao

  • 如果执行以下操作,则需要重新导出重新导入安全模型

    You should re-export and re-import your security model if you do the following.

    youdao

  • CubingServices安全模型包含以下元素

    The Cubing Services security model consists of the following elements.

    youdao

  • 为了保护患者隐私PODS设计采用一个多级安全模型

    To safeguard patient privacy, the PODS design USES a multilevel security model.

    youdao

  • 需要导入安全模型选择相同数据库如图15所示。

    You need to select the same database when you import your security model, as shown in Figure 15.

    youdao

  • UDDI安全模型注册中心结点策略以及它们实现集合定义

    The UDDI security model is defined by the set of registry and node policies and their implementations.

    youdao

  • DB2IDS安全模型两个主要组件组成身份验证授权

    Both the DB2 and IDS security model consist of two main components: authentication and authorization.

    youdao

  • 构建操作系统级别一个服务以便扩展浏览器安全模型

    Rather it is a layer that extends the browser’s security model down into the operating system level.

    youdao

  • 可用各种方式组合这些机制,以便各种加密技术建立各种安全模型

    These mechanisms can be combined in various ways to build a wide variety of security models using a variety of encryption technologies.

    youdao

  • 然后用户可以安全页面安全页面之间导航不会破坏安全模型

    Then, users could navigate between secured and non-secured pages without breaking the security model.

    youdao

  • 使用EJB安全模型调用服务实现会话ejb时,将实现授权处理

    Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.

    youdao

  • 不过JACC提供程序并不仅限于标准J2EE安全模型静态特性

    However, the JACC provider is not limited by the static nature of the standard J2EE security model.

    youdao

  • 需求主要安全责任应用程序定义一个水平核心安全模型

    The primary security duty of a requirements specifier is to identify at a high level the core security model for the application.

    youdao

  • 我们首先强调安全分布式环境重要性概述了DCE安全模型

    We started with a note on the importance of security in a distributed environment and an overview of DCE security model.

    youdao

  • 由于安全模型依赖多维数据集模型应该首先设计部署多维数据集模型

    Because the security model depends on the cube model, you should design and deploy the cube model before designing and deploying the security model.

    youdao

  • 安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。

    The end to end security model would mean that all providers give access to all trusted requesting applications.

    youdao

  • 状态所有者负责发起转换从而驱动应用程序安全模型(请参见5)。

    The owner of the state is responsible for initiating the transitions, so drives the security model of the application (also see Figure 5).

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定