This new model is a workflow authorization system based on workflow task scheduling.
新模型是基于工作流任务调度的授权系统。
The "tiny little" authentication and authorization system for this "tiny little" blog application is now in place.
这个“微型”博客应用程序的“微型”身份验证和授权系统现在已经初具雏形。
Does the supplier have an authorization system for receipt and dispatch of materials to and from storage areas?
供应商是否有授权系统材料,并从存储区的接收和派遣?
It is an urgent problem to evaluate the IPO company for underwriting business of investment banking under the authorization system.
核准制下如何对申请IPO企业进行综合评估是当前投资银行承销业务中的一项迫切需要解决的问题。
Peer to peer trust model is used in the authorization system, and the trust relationship among entities in grid environment is assessed with trust degree.
系统采用平等信任模型,通过信任度评估网格实体之间的信任关系。
Privileges, privilege groups, privilege sets and ACLs form the basis of the authorization system of IBM DB2 CM and are discussed in further detail later in the article.
权限、权限组、权限集合和ACL形成了IBMDB 2CM授权系统的基本结构,本文后面将详细讨论。
For example, if we're doing a time-sheet authorization system, two roles come to mind immediately: employees (who fill out time sheets) and managers (who authorize them).
例如,我们正在建立一个考勤卡授权系统,那么会立即想要两种角色:雇员(填写考勤卡的人)和经理(核准考勤卡的人)。
This paper introduces the overall structure of the authorization system of air zone for Guangxi weather modification operation and the function of various subsystems.
介绍广西人工影响天气作业空域报批系统的总体结构及各子系统的功能。
I built the domain aspects of the application last month, so what's left is to integrate it with Twitter's authorization system and then display the corresponding retrieved data.
上个月我建立了应用程序的域方面,那么剩下的将会把其与Twitter的授权系统集成在一起,然后显示相应的已检索数据。
The solution should implement some type of authentication system to understand who is asking for a resource and an authorization system to decide whether the access should be granted.
此解决方案应该实现某种类型的身份验证系统来理解谁正在请求一个资源,并实现一个授权系统来决定是否向其授予访问权。
This command USES the values found in the database manager configuration file and the authorization system catalog view (SYSCAT.DBAUTH). Listing 5 shows the results of issuing the command.
这个命令使用在数据库管理器配置文件和授权系统编目视图(SYSCAT.DBAUTH)中找到的值。
Given that SAML is a multi-party authentication and authorization system, it's possible for a valid participant in an SAML transaction to use the information maliciously in another transaction.
既然SAML是一种多方验证和授权系统,一个SAML事务中的合法参与者就有可能是用对其他事务有威胁的信息。
With the implementation of authorization system of issuance of shares, the evaluation of the stock issuer's quality of IPO, which has been neglected for a long time, has aroused great attention.
随着我国股票发行额度制的退出及股票发行核准制的正式实施,一直被忽视的IPO发行人质量评价问题得到了证券市场前所未有的重视。
It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.
所以,有这样的可能性:用户虽然通过了身份验证可以登录到一个系统,但是未经过授权,不准做任何事情。
If you have Authorization, then the person requesting access needs to be authorized to access the system.
如果您具有授权,则需要对请求访问的人进行授权以访问系统。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
It typically performs authorization checks on system calls and operation requests on resources named by a file system.
它通常对系统调用和通过文件系统指定的资源的操作请求执行授权检查。
It is possible that the offending client could even be authorized to use your system, but is trying to exploit that authorization in some inappropriate way.
这些攻击型的客户甚至可能是经过授权可以使用您的系统的用户,但却试图以一种不适当的方式来利用这种授权。
This is how we can easily limit who can even connect to a system over SSL, even if the server side components don't provide authorization.
通过这种方式我们就可以轻松地限制谁能通过SSL连接到系统,即使服务器端组件不提供授权。
Any bottleneck in authorization is likely to have a substantial and widely dispersed impact on system performance.
授权中的任何瓶颈都有可能对系统性能造成严重而广泛的影响。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
There is one area where fine-grained authorization models are ubiquitous and well-understood: the operating system.
存在这样一个区域,其中细粒度授权模型是普遍存在的和众所周知的:即操作系统。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
Take a look at various ways of authenticating to a CM system and various levels of authorization.
查看对CM系统进行身份验证的不同方法以及各种级别的授权。
This is how you can easily limit who can connect to a system over SSL -- even if the server side components don’t provide authorization.
通过这种方式可以轻松地限制谁能通过SSL连接到系统,即使服务器端组件不提供授权。
There is always a clear mapping between any given system authorization ID used to establish a connection and a specific trusted context.
在用于建立一个连接的任何给定系统授权id与一个特定的受信任上下文之间,总是有一个明显的映射。
It is capable of logging database events such as authorization checking, database object maintenance, security maintenance, system administration, and user validation.
它可以对一些数据库事件,例如授权检查、数据库对象维护、安全性维护、系统管理和用户验证等做日志记录。
Users require root-level authorization and a working knowledge of AIX system administration.
用户需要具有根级别授权并且具有AIX系统管理的应用知识。
The attribute specifies the level of authentication required to be performed on the system authorization ID during the establishment of the connection.
该属性指定在连接建立期间需要对系统授权ID进行的身份验证级别。
The flowchart in Figure 8 summarizes how the hierarchy of authorization takes place while a user tries to create an item in the CM system.
图8所示的流程图总结了当用户试图在CM系统中创建项目时,授权机制如何发挥作用。
应用推荐