This format is now based on ATOM and enables filtering of the access control information by the client.
这种格式现在基于ATOM并支持由客户机对访问控制信息进行过滤。
Central tools store user identity and access control information for the entire network in a single location and provide screens to manage it all.
中央工具在单一位置存储整个网络的用户标识和访问控制信息,并提供用于进行全面管理的界面。
On a portal, you can establish a single sign-on, or personalize and control your access to information, applications, processes, and people.
在一个门户网站,您可以建立单点登录,或者对信息、应用程序、流程和人的访问进行个人化和控制。
If we were to be able to effectively control access to the information for each persona, having robust and flexible session and user management would make our implementation easier.
如果我们能够有效地控制对每个人的信息的访问,那么具有健壮且灵活的会话管理和用户管理会使实现更容易。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.
自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。
Pulling together information from a variety of sources also carries with it security concerns, including access control.
将多种来源的信息整合在一起将会带来包括访问控制在内的安全性问题。
Information gathered by social network applications needs to be protected by policies which control access to information.
应该使用控制信息访问的策略来保护社交网络应用程序收集到的信息。
The older person is much more amenable if he or she "can control who has access to the information and what information they have access to," she said.
如果老人们能够控制谁有权得到信息并且哪些信息是别人有权得到的,他们将更愿意接受这些设备。
Therefore, to test them, you need to get direct access to information about how the control works from the control itself.
为了测试这些接口,您需要直接从控件本身获取控件如何工作的信息。
Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.
文档控制和安全:目的是为了管理以业务为主的信息的访问以及使用数字签名验证文档的真实性。
If I control my personal information, I want to ensure that I am the only one who can access that information. If someone maliciously accesses it, I want to prevent them from reading it.
如果我保护了我的个人信息,就应该确保我是唯一能得到那个信息的人,如果有人故意闯入,我就应该阻止他。
It also contains security namespace information and access control policies on all the Cognos objects.
它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。
The changes Facebook plans to introduce will allow users to control the types of personal information that applications can access.
Facebook计划推出的这些改变让用户能够管理个人信息类别,而这些信息程序制作者可以使用。
He said "no one has been able to take control of the iPhone to gain access to personal information using this exploit."
他说,到目前为止还没有人能利用这一漏洞控制iPhone,获知用户的个人信息。
The diagram in Figure 1, from the IBM Information Center, shows how access control works within ALM. To restate some of the concepts
图1 之中的图表,来自于IBM信息中心,显示了在ALM 之中是如何实现版本控制的。
The use of an access database to store test execution information means there's no unit-level change control over individual test cases or test plans.
一个保存测试执行信息的访问数据库的使用,意味着对于个体的测试案例或者测试计划没有单元级别的变更控制。
In proprietary access control systems, information about these entities and their attributes is kept in repositories.
在专有访问控制系统中,这些实体及其属性的信息保存在资料库中。
Usually PAC carries the authorization information that is used to make access-control decision.
通常pac包含制定访问控制决策所需的授权信息。
First, users should be given greater access to and control over the information held about them, including whom it is Shared with.
首先,用户们更好的利用和控制信息,包含这些信息与谁分享。
For more information, see How to: Add or Remove Access Control List Entries and ACL Technology Overview.
有关更多信息,请参见如何:添加或移除访问控制列表项和ACL技术概述。
Data management applications control, protect, and facilitate access to data in order to provide timely information to consumers.
为了向客户提供适时信息,数据管理应用程序控制、保护并促进了数据的访问。
Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.
Acegi将减轻代码编写的工作,因此在这篇文章中,我将展示如何将用户和用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略。
New! Botnet Detection -prevents others from taking control of your PC to access your private information or use it to host an attack.
新!僵尸网络检测,阻止他人控制你的电脑来存取您的私人信息或使用它来举办一次攻击。
In a nutshell - CardSpace is a set of Windows features and user-interface that lets users navigate access decisions and control how personal information is used.
简单地说,CardSpace是一组Windows功能和用户界面,它们允许用户导航访问权限和控制使用个人信息。
Network security is an important research area in the application of information system now, How to implement effective access control based on user's identity is very important.
网络安全是目前信息系统应用的一个重要研究方向,如何确定用户身份以控制用户对信息资源的访问,是其中的一个重要问题。
Does your factory implement procedures to document and control computer access and information?
工厂执行程序到文件和控制计算机通路和数据?
Information power results from access to and control over the distribution of important information about organizational operations and future plans.
信息的力量取决于能够传播并控制与组织运行和制定未来计划有关的重要信息分布的渠道。
Information power results from access to and control over the distribution of important information about organizational operations and future plans.
信息的力量取决于能够传播并控制与组织运行和制定未来计划有关的重要信息分布的渠道。
应用推荐