Secure access control for services using policies is also provided.
还提供了通过策略实现的服务安全访问控制。
You have also seen how JSF and Acegi work together to secure access to bean data.
还看到了JSF和Acegi如何协作以保护对bean 数据的访问。
Allowing secure access to a VM is covered in the Security section later in this article.
本文后面的安全性一节将介绍对虚拟机的安全访问。
Protocols like SSL are supported to allow a secure access to the available cloud resources.
Libcloud也支持SSL等协议,允许对可用的云资源进行安全访问。
Moreover, secure access to the Service Registry requires configuration of an SSL connection.
此外,对ServiceRegistry的安全访问需要配置SSL连接。
You now have the basics of your service complete, but it's essential that you secure access to it.
现在已完全拥有了服务的基础,但还有必要实现对其安全访问。
The next article in this series will demonstrate how to use Acegi to secure access to JSF's managed beans.
本系列的下一篇文章将演示如何使用Acegi保护对JSF的托管bean的访问。
Our goal will be to provide machines with secure access without requiring the need to manually provide passwords.
我们的目标将是,不需要人工提供密码就可以安全地访问机器。
The security policy 7 defines the assertions used to create a secure access channel between the TCS and the service.
安全策略7定义用于在TCS和服务之间创建一个安全访问通道的声明。
It allows end users and applications to gain secure access to any information source, regardless of where it resides.
它使最终用户和应用程序可以获得对任何信息源的安全访问,不管它在什么地方。
The current secure access control techniques in IP multicast just implemented the access control to multicast receivers.
目前针对IP组播的安全访问控制问题的解决方案只是实现了对组播接收者的访问控制。
An OpenID Relying Party, as you'll recall, is a Web site or other online resource that requires secure access to its contents.
OpenID依赖方是网站或其他在线资源,它们要求对其内容的访问是安全的。
It USES the technique you've learned in the previous couple of sections to secure access to data wrapped inside JSF managed beans.
它使用前面两节介绍的技术保护对jsf托管bean内包装的数据的访问。
It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.
本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制。
The on-demand technology reduces the cost of remote communications while providing a safe and secure access to your controller.
在随需应变技术降低成本,偏远地区通讯,同时提供一个稳妥可靠的存取控制。
Secure access to services: Enterprise beans permit various method-level security features to be declared in the deployment descriptor.
对服务的安全访问:企业beans允许在部署描述符中声明不同方法级别的安全特性。
FAO programmes assist poor households and communities to secure access to nutritionally adequate diets and reduce child undernutrition.
粮农组织的计划帮助贫穷家庭和社区获得营养充足的膳食,减轻儿童的食物不足问题。
Through the research, the author hopes that this paper can offer help for the application developers to realize Database Secure Access.
通过本文的研究,希望能够为应用开发者就数据库访问安全的实现提供有价值的参考。
This paper analyzes how to realize secure access control for XML documents using RBAC from aspects of role, role hierarchy, authorization, etc.
文中从角色、角色继承、授权等方面分析了如何利用RBAC实现对XML文档的安全访问控制。
Third -- and where the JDBC specification does not have any corresponding focus -- is security management for enabling secure access to back-end systems.
第三个是支持后端系统的安全访问的安全性管理,在这点上,JDBC规范并没有任何对应点。
Beyond simply providing business logic, applications must support secure access, persistence of data, transactional behavior, and other advanced features.
除了简单地提供商务逻辑之外,应用程序必须支持访问安全控制,数据持久化,事务,和其它的进阶功能。
It's important to ensure that access permissions are properly set because the OpenSSH server may refuse to use keys which have non-secure access rights.
确保正确设置访问权限非常重要,因为OpenSSH服务器可能拒绝使用具有不安全的访问权的密钥。
The framework lego/messaging architecture provides transparent and secure access to remote components: remote framework objects are treated as local objects.
框架lego/messaging架构提供对远程组件的透明和安全访问;可将远程框架对象看作是本地对象。
This paper proposed a simple and secure access control mechanism that can effectively control mobile agents updating and creating ability in native host.
本文提出了一个简单安全的存取控制机制,可以有效地控制移动代理在本地主机的更新及创建权限。
All these advantages, such as irrelevance with the platform and convenience in the configuration have made SSL VPN the best choice in remote secure access.
SSLVPN以与平台无关性、配置方便性等优点成为解决远程安全访问的首选。
This provides more secure access than a traditional alternative: Run the Web server as root (!), with instances switching to the privilege of the file accessor.
与传统备选方法相比,这种方法提供了更安全的访问:以 root 的身份运行Web服务器,并提供转换到文件访问器权限的实例。
The first is to get them into the classroom; the second is to secure access to higher education, followed by entry into and promotion within the labor market.
第一个目标是让她们进入课堂;第二个目标是保证她们能够获得更高的教育,然后进入劳动力市场并在其中得到提升。
The first is to get them into the classroom; the second is to secure access to higher education, followed by entry into and promotion within the labor market.
第一个目标是让她们进入课堂;第二个目标是保证她们能够获得更高的教育,然后进入劳动力市场并在其中得到提升。
应用推荐