• SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.

    SCA单个服务集合业务解决方案的组装提供了一个模型控制解决方案的各个方面,访问方法安全。

    youdao

  • In the current network-centric business model it is becoming increasingly difficult to validate a person's identity, control access, and maintain integrity and privacy of data.

    当前以网络为中心业务模型中,验证个人身份控制访问维护数据完整性保密性变得越来越

    youdao

  • Rules relating to business processes or activities: These rules relate to flow control logic within a business process model, affecting the branching, and flow control of a sequence of business tasks.

    业务流程活动相关规则这些规则与业务流程模型中的控制逻辑相关它们影响分支业务任务序列流控制。

    youdao

  • You must select the appropriate deployment model by balancing your needs for customization and control against the TCO and TTV that your business requires.

    必须针对公司需要TCOTTV平衡您的定制控制需求选择适当部署模型

    youdao

  • View beans also let us separate presentation logic from our business logic, keeping HTML code out of our servlets and other control and model objects.

    视图bean允许我们表示逻辑我们商业逻辑分离开来,将HTML代码放在servlet以及其它控件模型对象之外。

    youdao

  • In addition to gateways, several of these modeling languages (we will only look at Business Modeler) offer an alternative approach to model control and data flow.

    网关外其中的部分建模语言(我们关注Business Modeler)还提供了建立控制数据流模型的一种可选方法

    youdao

  • For either model, you use IBM WebSphere business Modeler to model the link between business processes, and technological and control requirements.

    对于模型,都可以使用IBMWebSphereBusiness Modeler来对业务流程技术控制要求之间联系进行建模。

    youdao

  • To implement business process management in virtual enterprises, a kind of new workflow control model was proposed by introduction of Agent.

    为了实现虚拟企业业务过程管理引入智能体,设计新型工作流控制模型

    youdao

  • In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    youdao

  • Based on generalized framework for access control, the author has developed an application model on universal database by conceptual and extract business logics.

    本文通过业务逻辑的抽象提取,形成通用数据库访问控制框架此框架下的访问控制要素的聚类模型

    youdao

  • The access control rule of the ACBAC model is formalized by the first order predicate logic. The realization method of the model in business process management systems is also discussed.

    文章谓词模型访问控制约束规则进行形式化描述,并讨论了模型业务流程管理系统中的实现方法

    youdao

  • With the solid growth we've experienced, our business needs have evolved and we require the independence, flexibility and control offered by the standalone model.

    稳健增长我们经历的,我们业务需要演变我们所要求独立性灵活性控制单机模式

    youdao

  • Through analyzing this model, it points out to apply this model at hospital management that can make the business process normal, supervise and control the medical treatment process.

    通过对此模型分析指出医院管理中应用模型能够规范业务流程监控医疗过程执行。

    youdao

  • This paper builds the cost control model for the logistics enterprises business based on the cost strategy, and provides a new perspective and ideas to implement the logistics cost control.

    文中构建基于成本战略物流企业成本控制模型旨在使物流成本控制服务于物流企业成本战略。

    youdao

  • This paper builds the cost control model for the logistics enterprises business based on the cost strategy, and provides a new perspective and ideas to implement the logistics cost control.

    文中构建基于成本战略物流企业成本控制模型旨在使物流成本控制服务于物流企业成本战略。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定