Each role must be defined in the deployment descriptor of each Web or enterprise application, and security constraints must be created to secure each authorization-controlled resource.
必须在每个Web或企业应用程序的部署描述符中定义每个角色,并且必须创建安全约束来保护每个授权控制的资源。
The user accessing your secure bean will not possess the business role that the remote application expects from a user trying to access it.
访问安全bean的用户不会占用远程应用程序要求访问用户所具备的业务角色。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.
在安全信息系统应用中,传统的基于角色的访问控制模型不能为用户过滤业务数据,容易导致数据失密。
应用推荐