J2EE provides both declarative and programmatic role-based authorization capabilities.
J2EE同时提供了声明和编程形式的基于角色的授权功能。
Customizing the UI to remove links and menu options is very analogous to role-based authorization.
自定义ui以删除链接和菜单选项的做法与基于角色的授权非常相似。
Role-based authorization of transaction protocol messages is supported only for WebSphere-to-WebSphere interactions.
传输协议消息的基于角色的授权仅支持 WebSphere到 WebSphere 的交互。
Role-based authorization provides access to resources based on the fact that the user is a member of some class of users.
基于角色的授权基于用户是某类用户的成员这一事实提供对资源的访问。
See the section Role-based authorization in the WebSphere Application Server 5.0 InfoCenter for more information on these roles.
请参阅WebSphereApplicationServer 5.0信息中心的 Role-based authorization部分以获取有关这几种角色的更多信息。
Role-based authorization protects resources by only making them available to users who have been assigned to the appropriate role.
基于角色的授权通过仅将资源提供给已分配相应角色的用户来保护资源。
This paper also extends a role-based authorization constraint model to describe constraints with spatial character on different levels, which is suited for wireless network.
对角色的授权约束加入空间特性,使之能够形式化描述多个层面的空间职责分离约束,从而适用于无线网络的应用环境。
This pattern provides a more granular level of authorization than is typically provided by J2EE role-based authorization, getting down to the level of an individual object within a system.
与J2EE基于角色的授权通常提供的授权相比,此模式提供了更细粒度的授权,可以一直细化到项目内的单个对象的级别。
As in our earlier discussion of custom role-based authorization, there may be situations where the view of data is contextual such that it cannot be simply adjusted based on static roles.
正如前面讨论自定义基于角色的授权时所提到的,可能会存在数据视图与上下文相关的情况,并不能仅简单地基于静态角色对其进行调整。
You'll learn how to enable logins, limit activity based on whether or not the User is logged in, and even add in some authorization based on the User's role.
您将理解到如何根据User是否登录启用登录、限制用户行为,甚至根据User的角色添加一些授权。
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
Authorization Support: Handled a variety of ways whether you use Windows authentication, thread principals, ASP.NET role-based security or your own.
授权支持:可以处理各种授权方式,不管你是使用Windows验证、线程安全主体、ASP.NET基于角色的安全模式或者你自己自定义的。
Solving authorization problems with system based on role and introducing concept of sub-role to solve problem of complex privileges and roles in NMS.
使用基于角色的系统解决了系统的授权问题,并且引入子角色的概念,解决了综合网管系统中角色和权限复杂繁多、不易分配的问题;
Based on careful research, a project of user management is designed, which can implements dynamic role management, dynamic authorization management, and have a flexible authorization way.
在深入调查研究的基础上,设计了一个能够实现动态角色管理、动态权限管理、授权方式灵活的用户管理方案。
And a WFMS authorization model based on role control and time constraints is constructed, and how it meets the desires of least privilege and separation of duty is discussed.
构建了一个带有时间约束的基于角色的工作流系统授权模型,分析该模型对最小权限和责任分离要求的满足情况。
Role-Based Delegation Model mainly solves the centralization and complexity questions of traditional authorization management, and satisfies the requirement of distributed computing environment.
基于角色的委托授权模型旨在解决传统授权管理的集中性和复杂性问题,从而满足分布式计算环境的需求。
Role-Based Trust Management System (RBTM) is an effective way to authorization solution in distributed credential management system, and is a hot field in Computer Security.
基于角色的信任委托管理系统是分布式证书管理系统中一个重要的授权管理解决方案,也是计算机安全领域的研究热点。
This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.
该文介绍了RBAC与代理机制相结合所带来的授权问题,在定义了角色屏蔽概念的基础上,提出了面向代理机制的角色访问控制模型。
A role-mapping-based authorization method was presented to solve authorization problems across autonomous systems for the decentralized federate integration of networked manufacturing platforms.
为解决网络化制造平台联邦集成中的跨平台授权问题,提出了一种基于角色映射的跨平台授权方式。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
By evaluating the value of user attributes in the user credential, a qualified user is assigned to a specific role. This allows access authorization based on user characteristics and qualifications.
通过对用户证书中的属性取值进行评估,把符合条件的用户分配给特定角色,从而达到了根据用户的特征及资历实施访问授权的目的。
You can use the WCF role service as a way to manage the user interface based on the user's authorization Settings.
可以使用WCF角色服务作为一种基于用户的授权设置管理用户界面的方法。
The paper demonstrates the design and realization of role design and authorization based on the platform development of a specific Internetbased course.
文章以具体的网络课程平台开发为例,阐述了其中角色及权限的设计与实现,对其他类似平台系统设计与开发具有一定的参考意义。
The paper demonstrates the design and realization of role design and authorization based on the platform development of a specific Internetbased course.
文章以具体的网络课程平台开发为例,阐述了其中角色及权限的设计与实现,对其他类似平台系统设计与开发具有一定的参考意义。
应用推荐