Assigns access rights to the queue based on the contents of an access control entry.
根据存取控制项目的内容指派伫列的存取权限。
An access control list is a list of permissions or sets of permissions securing a resource.
访问控制列表是权限列表或保护资源的权限集。
This is the interface used for representing one entry in an Access Control List (ACL).
该接口用来表示访问控制列表中(acl)的一个入口。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
The implement of the model depends on a message processing security model and an access control model.
模型依赖于一个消息安全处理模型和一个访问控制模型。
Represents a combination of a user's identity, an access mask, and an access control type (allow or deny).
表示用户的标识、访问掩码和访问控制类型(允许或拒绝)的组合。
Provides the ability to iterate through the access control entries (ACEs) in an access control list (ACL).
提供遍历访问控制列表 (ACL)中的访问控制项 (ACE)的能力。
An access rule represents a combination of a user's identity, an access mask, and an access control type (allow or deny).
访问规则表示用户的标识、访问掩码和访问控制类型(允许或拒绝)的组合。
An access control mechanism is given for the protection of the resource module in the object oriented programming systems.
给出了一种用于保护面向对象编程系统的资源模块的访问控制机制。
This paper provides an access control mechanism within collaborative CAD, based on a technique we call role-based viewing.
提出了协同CAD中信息存取的机制,这种机制是以基于角色的视图技术为基础的。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.
您还详细了解了配置Acegi 的方法,从而与LDAP目录交互实现访问控制策略。
Create some test objects in Access Manager, such as users, groups, and protected resources, and then add an Access Control List policy.
在AccessManager中创建一些测试对象,如用户、组和受保护资源,然后添加访问控制列表策略。
This model can resolve various security problem of current applications, and can be extended to an access control model for the different domains.
该模型可以很好地解决现在一些系统中存在的安全问题,并且可以扩展成多域之间的安全互访问模型。
If so, you must protect the directory containing these files, using code access security or an access Control List in the file system, as appropriate.
如果存在,则必须相应地使用文件系统中的代码访问安全机制或访问控制列表,来保护包含这些文件的目录。
For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.
现在,只需了解拦截器可以拦截用户并在用户访问bean之前实现访问控制策略。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML.
针对网格环境下资源访问控制的特点,提出了一个基于使用控制模型UCON,结合XACML和SAML的访问控制模型。
The administrator configures an access control list that is assigned to each process, so that there is a business control to define who can do what in which process.
管理员配置分配给每个过程的访问控制列表,这样就存在定义该过程中谁能够做什么的业务控制。
To provide a direct and precise description for workflow access control, an access control model for workflow systems was developed based on graph and graph transformation.
为了直观和准确地描述工作流访问控制,提出了一个基于图的工作流访问控制模型。
The next article in this series will get you started with some more advanced uses of Acegi, beginning with writing an access control policy and storing it in a directory service.
本系列的下一文章将开始介绍 Acegi 的一些较为高级的应用,首先是编写访问控制协议并将其存储到目录服务中。
In this second article, I begin to discuss the more advanced USES of Acegi, starting with writing an access control policy and storing it in ApacheDS, an open source LDAP directory server.
在第二篇文章中,我将讨论Acegi的更加高级的应用,首先我将编写一个访问控制策略并将其存储在ApacheDS中,ApacheDS是一个开源的LDAP目录服务器。
Acegi relieves you from writing code, so in this article, I show you how to first store user and role information in ApacheDS and then implement an access control policy for that information.
Acegi将减轻代码编写的工作,因此在这篇文章中,我将展示如何将用户和用户角色信息存储到ApacheDS中,然后实现这些信息的访问控制策略。
In this paper, we present an access control scheme that can resolve these issues, and propose a dynamic context-aware access control model (DCAAC) which extends RBAC with context constraints.
本文提出了一个上下文感知的访问控制模型(DCAAC),D CAAC扩展了RBAC模型,增加了上下文约束。
Then, an access control model based on organization modeling for enterprise information systems is proposed, the elements are defined and the mechanism for realizing control access is advanced.
在此基础上给出一个基于组织建模的企业级信息系统访问控制模型,定义了一组模型要素并给出了实现访问控制的机理。
You can now build an application around this that can control access to functionality based on the user roles you have defined in your LDAP directory.
您现在可以围绕着这个骨架,构建一个能够基于您在LDAP目录中定义的用户角色控制对功能的访问的应用程序。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
A lock associates the resource with an application, called the lock owner, to control how other applications can access the same resource.
锁将资源与应用程序(叫做锁拥有者)相关联,以控制其他应用程序对同一资源的访问。
A lock associates the resource with an application, called the lock owner, to control how other applications can access the same resource.
锁将资源与应用程序(叫做锁拥有者)相关联,以控制其他应用程序对同一资源的访问。
应用推荐