• Figure 7: Access control for RAM can be configured to allow the same user to have multiple roles across multiple communities with varying permissions and constraints.

    7可以RAM访问控制配置为,允许同一个用户多个社区中扮演拥有各不相同权限约束的多个角色

    youdao

  • Having the constraints defined in the database allows DB2 to know relationships between tables and in some cases allows it to select better access plans based on that knowledge.

    数据库定义约束使DB 2可以知道之间的关系,并且某些情况下允许DB 2根据这样知识选择更好访问计划

    youdao

  • If you're going to expose services to external users, you need some kind of security constraints that make sure that only authorized users can access the services.

    如果准备外部用户公开服务需要某种安全约束保证只有授权的用户才能访问服务。

    youdao

  • Sometimes certain requirements or constraints on the access to the service itselfincluding authentication, integrity, and confidentiality requirements — are needed by a client run time.

    客户机运行有时需要某些访问服务本身要求约束(包括身份验证完整性机密性要求)。

    youdao

  • They say gender division of labor and constraints on access for women to land also create problems.

    他们劳动分工性别化以及妇女获取土地方面受到的限制都是问题

    youdao

  • The resource kernel can then merge the requests to define a schedule to provide guaranteed access using the task-defined constraints (or return an error if they cannot be guaranteed).

    然后资源内核可以合并这些请求使用任务定义约束定义一个调度,从而提供确定的访问如果无法提供确定性返回错误)。

    youdao

  • Within such a platform, enforcing security constraints between applications and between application tenants is a critical requirement and Tivoli Access Manager can play a key role.

    此类平台中,在应用程序应用程序租户之间实施安全约束关键需求TivoliAccessManager能够扮演这个关键角色。

    youdao

  • Note that when modifying and adding entries using Microsoft Access, the constraints of your underlying database tables are adhered to.

    注意使用MicrosoftAccess修改添加条目遵守底层数据库约束

    youdao

  • Severe resource constraints and difficult terrain limit access to health-care facilities in many parts of Nepal.

    尼泊尔很多地区存在着严重资源制约因素不利地形条件,这些不利因素限制了人们使用医疗设施的能力。

    youdao

  • The only advantage provided at present is support for XPath-based constraints and access methods in the generated code.

    目前这种方法所具有唯一好处生成代码支持基于XPath的约束访问方法。

    youdao

  • You would typically define one or more roles whose users would have the right the access the scripts depending on the security constraints specified in the web.xml file.

    根据web. xml文件指定安全性约束通常定义一个多个角色这些角色的用户拥有访问这些脚本适当权限

    youdao

  • Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.

    通过部署描述符中的安全约束可以应用程序资源(ejb方法web页)声明需要授权才能进行访问

    youdao

  • If the application contains a mixture of secure (those with authorization constraints) and insecure servlets, the insecure servlets cannot access the session object.

    如果应用程序包含安全(具有授权约束的)安全Servlet混合体,则不安全的Servlet将无法访问会话对象。

    youdao

  • Find and fix database problems with constraints, triggers, extents, indexes, and grants Toad utilizes direct Oracle OCI calls for full access to the Oracle API.

    定位修复数据库约束触发器、区(extent)和索引上的问题,同时可以让Toad直接利用OracleOCI调用获得OracleAPI完全访问

    youdao

  • Combining both types of interfaces within a single application, supporting both ways of access to the bean, may help relax design constraints.

    单个应用程序组合类型接口支持两种访问Bean方式有助于减少设计约束

    youdao

  • The web.xml file lists constraints and security roles that exist in your application as well as the roles that are allowed access to a certain directory.

    xml文件列出应用程序存在约束安全角色以及允许访问某个目录角色。

    youdao

  • Temporal constraints are introduced in the user assignment and permission assignment to express and realize more powerful access control semantics.

    用户分配权限分配中引入时间约束表示实现更为丰富的访问控制语义

    youdao

  • The occiput does not easily accommodate instrumentation because of access and spatial constraints.

    由于入路空间结构限制,对枕骨进行固定并非易事。

    youdao

  • From table Designer, you can also right-click in the grid section to access dialog boxes through which you can create and modify relationships, constraints, indexes, and keys for the table.

    [资料设计工具],可以方格按一下滑鼠右键存取可用建立修改资料表关联性条件约束索引索引键对话方块

    youdao

  • This model extends the traditional RBAC model with user credentials, temporal constraints and XML document classification to enforce a content-based time-aware multi-granularity access control.

    模型用户证书时间约束XML文档分类等方面传统RBAC模型进行了扩展,以实现基于内容的时间上下文敏感的多粒度访问控制

    youdao

  • In this paper, we present an access control scheme that can resolve these issues, and propose a dynamic context-aware access control model (DCAAC) which extends RBAC with context constraints.

    本文提出了一个上下文感知访问控制模型(DCAAC),D CAAC扩展了RBAC模型,增加了上下文约束

    youdao

  • The equipment cost is extremely high and applications are restricted to very large projects where terrain, weather, time, and access impose special constraints on traditional methods.

    设备成本非常应用受到限制非常项目地形天气时间特殊限制传统方法。

    youdao

  • Constraints are considered to be the principal motivation for Role-Based Access Control (RBAC).

    限制可以视为基于角色的访问控制(RBAC)主要动机

    youdao

  • An index is a mechanism for providing fast access to table rows or for enforcing certain constraints.

    索引一种提供快速访问强制某些约束机制

    youdao

  • The teacher builds up scaffolding for learners, with the help of the random access of the hypertext to overcome the constraints of printed texts.

    教师从知识传授者变成建立关联脚手架搭建者,并通过利用计算机可随机存取超文本特性克服纸质材料线性呈现的局限性。

    youdao

  • It becomes necessary to achieve an energy-efficient medium-access protocol subject to power constraints and large scale, so it is also the one of key points in the research.

    由于受到传感器网络节点数量巨大能量有限限制,设计一种节能的MAC协议非常必要的,也是当前此领域研究重点之一。

    youdao

  • It becomes necessary to achieve an energy-efficient medium-access protocol subject to power constraints and large scale, so it is also the one of key points in the research.

    由于受到传感器网络节点数量巨大能量有限限制,设计一种节能的MAC协议非常必要的,也是当前此领域研究重点之一。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定