• Finally, this paper describes the implementation of the major functions, including the implementation of EJB components, resources object access control and asynchronous message sending.

    最后,详细介绍了子系统中主要功能实现方法,包括EJB组件实现、资源对象访问控制的实现异步消息发送的实现等内容。

    youdao

  • Cheetah provides a simple language for defining templates that provides basic flow control and object access constructs.

    Cheetah提供一门简单语言用来定义提供基本控制对象访问构造的模板

    youdao

  • There are various permissions - read, write, full control - assigned to users, and access granularity established at bucket or object level.

    各种权限完全控制指定用户bucket对象级别的访问粒度

    youdao

  • The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.

    ObjectAuthorityManager (oam)中定义授权策略可以基于用户ID组成员身份进行访问控制

    youdao

  • Once a session object is obtained, it can be used to interact with the Lotus Domino server using the access control level granted to the user defined by the LTPAToken.

    获得会话对象之后,可以使用LTPAToken定义授权用户访问控制级别LotusDomino服务器之间实现交互

    youdao

  • The OleAutomation object allows you to access properties and execute commands that are provided by the ActiveX control.

    OleAutomation对象允许开发人员访问特性执行activex控件提供命令

    youdao

  • When you define an object or a bucket in S3, you can specify an access-control policy that states who can access your S3 assets and how (for example, read and write permissions).

    s3定义对象存储可以指定一个访问控制策略,注明可以访问的S3资产以及如何访问(例如权限)。

    youdao

  • The annotated interface that defines the data access object provides a central control point to manage the SQL statements for the entire application.

    带注释接口管理整个应用程序sql语句提供一个集中控制点

    youdao

  • An access control mechanism is given for the protection of the resource module in the object oriented programming systems.

    给出了用于保护面向对象编程系统资源模块访问控制机制

    youdao

  • Using access-control lists (ACLs), you could have created an action in the products controller and used it to grant create access to the user's access-request object (ARO) on each dealer ACO.

    可以使用访问控制列表(Access Control List,ACL)products控制器创建一个操作使用每个经销商aco用户访问请求对象(ARO)授权create访问权限。

    youdao

  • The security administrator can dictate the level of security by applying rules known as protected object policies (POP) and access control lists (ACL).

    安全管理员可以通过应用protectedobjectpolicies (POP)access controllists (acl)规则指定安全等级

    youdao

  • The Proxy Pattern: provides a surrogate or placeholder for another object to control access to it.

    代理模式另一个对象提供替身占位符控制这个对象的访问

    youdao

  • This resolving scheme is based on advanced J2EE platform, applies MVC pattern, Session Facade pattern and Data Access Object pattern to control E-mail from two directions of sending and receiving.

    解决方案架构先进J2EE平台之上应用MVC模式会话模式数据访问对象模式等J2EE开发模式,两个方向电子邮件进行了有效控制

    youdao

  • OPC applies OLE (Object Linking and Embedding) technology into Industry Process Control Fields, and provides a kind of standard data access method.

    OPC把对象链接嵌入技术应用于工业过程控制领域工业控制领域提供了标准数据访问机制

    youdao

  • The thesis dissertates access control policies and access control implementations, analyzes military security model and object protection in databases.

    本文讨论了存取控制策略实现方法分析了军用安全模型数据库中的对象保护技术。

    youdao

  • The object of wireless media access control technology is to improve the system throughput, ensure fairness and reliability and reduce access delay.

    无线媒体接入控制技术提高系统吞吐率保证公平性可靠性降低接入时延为主要目标

    youdao

  • Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.

    采用消息过滤算法可以在支持对象模型多级安全系统实现强制访问控制

    youdao

  • In the model an associated object was presented, so the permissions can be obtained through roles and objects. The access control processes were described with the description logic.

    模型引入客体与客体的关联使得权限既可以通过角色可以通过客体获得,并采用描述逻辑对模型访问控制过程进行了形式化描述。

    youdao

  • However, RBAC and GRBAC are difficult to meet dynamic access control requirements because they are essentially established on the static subject-object view.

    然而RBACGRBAC本质建立静态主体-客体访问控制思想之上的,难以满足动态访问控制的要求

    youdao

  • To fix the problem, someone with Full Control access to the document or workbook must change the default permission Settings to allow programmatic access to the object model.

    解决问题必须某位对于文档工作簿具有“完全控制访问权限的用户默认权限设置进行更改允许通过编程的方式访问该对象模型

    youdao

  • This paper describes the access control method for the specific relational-object data structure on the base of the self-developed spatial database, VISTA.

    论文自主开发空间数据库VISTA基础针对特定的对象-关系型数据结构,提出了相应的访问控制方法

    youdao

  • Propose an object-oriented and formal access control model for developers to design security mechanism of systems and for users to perform their duties securely and efficiently.

    采用对象技术提出了一个通用的访问控制模型,提供应用级访问控制机制安全管理方法。

    youdao

  • To keep independent object-oriented system secure from Trojan horse, there exists already a restrictive policy that blends information flow control with discretionary access control.

    描述了面向对象系统数据模型,研究了信息流信息传输,并以此为基础给出了基于自主访问控制策略的分布式对象系统的信息流控制方法。

    youdao

  • Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control.

    利用对象继承特性引入粒度权限管理概念,把资源的控制菜单粒度分解原子操作粒度。

    youdao

  • Introducing the idea about finely granular access control through Inherit attributes of object, decomposes the access privilege from menu to atom control.

    利用对象继承特性引入粒度权限管理概念,把资源的控制菜单粒度分解原子操作粒度。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定