• Figure 1 provides an overview of the DB2 UDB security model.

    1DB 2UDB安全模型概述

    youdao

  • Understanding the steps to design and deploy a security model.

    理解设计部署安全模型步骤

    youdao

  • The security model contains the rules for accessing OLAP objects.

    安全模型包含访问OLAP对象规则

    youdao

  • The Cubing Services security model consists of the following elements.

    CubingServices安全模型包含以下元素

    youdao

  • The security model for static SQL is also different than for dynamic SQL.

    静态SQL动态sql安全模型不同

    youdao

  • JACC provides good support for implementing the standard J2EE security model.

    JACC实现标准J2EE安全模型提供了良好支持

    youdao

  • The security model for static SQL is also different from that of dynamic SQL.

    静态SQL动态sql安全模型不同

    youdao

  • This article touches on the various aspects and concepts of CM security model.

    本文涵盖CM安全模型所涉及各个方面概念

    youdao

  • To safeguard patient privacy, the PODS design USES a multilevel security model.

    为了保护患者隐私PODS设计采用一个多级安全模型

    youdao

  • You should re-export and re-import your security model if you do the following.

    如果执行以下操作,则需要重新导出重新导入安全模型

    youdao

  • Add access restriction to multiple Web resources using the J2EE security model.

    利用J2EE安全性模型多个Web资源添加访问限制

    youdao

  • In many ways RM just plugs in with whatever other security model is already in place.

    RM可有多种方法、插件方式其他安全模型中工作。

    youdao

  • The diagram in Figure 2 Outlines the security model used in the sample case management asset.

    2描述示例案例管理资产使用安全模型

    youdao

  • You need to select the same database when you import your security model, as shown in Figure 15.

    需要导入安全模型选择相同数据库如图15所示。

    youdao

  • Repeat the steps you followed in this article to export, import, and enforce your security model.

    重复本文导出导入实施安全模型步骤

    youdao

  • However, the JACC provider is not limited by the static nature of the standard J2EE security model.

    不过JACC提供程序并不仅限于标准J2EE安全模型静态特性

    youdao

  • The security model does not contain the actual definition of these OLAP objectsthe cube model does.

    安全模型并不包含这些OLAP对象实际定义多维数据集模型工作

    youdao

  • Rather it is a layer that extends the browser’s security model down into the operating system level.

    构建操作系统级别的一个服务以便扩展浏览器安全模型

    youdao

  • Then, users could navigate between secured and non-secured pages without breaking the security model.

    然后用户可以安全页面安全页面之间导航不会破坏安全模型

    youdao

  • Both the DB2 and IDS security model consist of two main components: authentication and authorization.

    DB2IDS安全模型两个主要组件组成身份验证授权

    youdao

  • The UDDI security model is defined by the set of registry and node policies and their implementations.

    UDDI安全模型注册中心结点策略以及它们实现集合定义

    youdao

  • Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.

    显然需要考虑某种安全模型限制不可信资源加载

    youdao

  • This security model allows administrators to restrict access to trusted origins in a very flexible way.

    安全性模型允许管理员一种非常灵活方式限制受信任站点的访问

    youdao

  • The end to end security model would mean that all providers give access to all trusted requesting applications.

    安全模型意味着所有提供者将授予所有受信任请求应用程序访问权限。

    youdao

  • Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.

    使用EJB安全模型调用服务实现会话ejb时,将实现授权处理

    youdao

  • The kernel usually has some sort of security model that manages access to devices, files, processes, and objects.

    内核通常具有某种类型安全模式管理设备文件进程对象的访问

    youdao

  • To limit the cubes and members of a dimension that a role can access, you need to design and deploy a security model.

    限制角色可以访问维度多维数据集成员需要设计部署一个安全模型

    youdao

  • We started with a note on the importance of security in a distributed environment and an overview of DCE security model.

    我们首先强调安全性分布式环境重要性概述了DCE安全模型

    youdao

  • It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.

    文中介绍DB 2UDB安全模型包括用户身份验证、用户授权以及超级用户。

    youdao

  • This suggests a tiered security model where the spoke nodes are the baseline and the hub is hardened, similar to a gateway.

    人想起分层安全模型其中分支节点基准中心加以硬化,类似于网关。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定