Figure 1 provides an overview of the DB2 UDB security model.
图1是DB 2UDB安全模型的概述。
Understanding the steps to design and deploy a security model.
理解设计和部署安全模型的步骤。
The security model contains the rules for accessing OLAP objects.
安全模型包含访问OLAP对象的规则。
The Cubing Services security model consists of the following elements.
CubingServices安全模型包含以下元素。
The security model for static SQL is also different than for dynamic SQL.
静态SQL与动态sql的安全模型也不同。
JACC provides good support for implementing the standard J2EE security model.
JACC为实现标准J2EE安全模型提供了良好的支持。
The security model for static SQL is also different from that of dynamic SQL.
静态SQL与动态sql的安全模型也不同。
This article touches on the various aspects and concepts of CM security model.
本文涵盖了CM安全模型所涉及的各个方面和概念。
To safeguard patient privacy, the PODS design USES a multilevel security model.
为了保护患者隐私,PODS的设计采用一个多级安全模型。
You should re-export and re-import your security model if you do the following.
如果执行以下操作,则需要重新导出和重新导入安全模型。
Add access restriction to multiple Web resources using the J2EE security model.
利用J2EE安全性模型向多个Web资源添加访问限制。
In many ways RM just plugs in with whatever other security model is already in place.
RM可有多种方法、以插件方式在其他安全模型中工作。
The diagram in Figure 2 Outlines the security model used in the sample case management asset.
图2描述示例案例管理资产中使用的安全模型。
You need to select the same database when you import your security model, as shown in Figure 15.
您需要在导入安全模型时选择相同的数据库,如图15所示。
Repeat the steps you followed in this article to export, import, and enforce your security model.
重复本文中导出、导入和实施安全模型的步骤。
However, the JACC provider is not limited by the static nature of the standard J2EE security model.
不过,JACC提供程序并不仅限于标准J2EE安全模型的静态特性。
The security model does not contain the actual definition of these OLAP objects—the cube model does.
安全模型并不包含这些OLAP对象的实际定义 —那是多维数据集模型的工作。
Rather it is a layer that extends the browser’s security model down into the operating system level.
它是构建在操作系统级别的一个服务层,以便扩展浏览器的安全模型。
Then, users could navigate between secured and non-secured pages without breaking the security model.
然后,用户可以在安全页面和不安全页面之间导航而不会破坏安全模型。
Both the DB2 and IDS security model consist of two main components: authentication and authorization.
DB2和IDS安全模型都由两个主要组件组成:身份验证和授权。
The UDDI security model is defined by the set of registry and node policies and their implementations.
UDDI安全模型由注册中心和结点策略以及它们的实现集合定义。
Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.
显然,您需要考虑某种安全模型以限制不可信资源的加载。
This security model allows administrators to restrict access to trusted origins in a very flexible way.
该安全性模型允许管理员以一种非常灵活的方式,来限制对受信任站点的访问。
The end to end security model would mean that all providers give access to all trusted requesting applications.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
Authorization is achieved when the service implementation, session EJB, is called using the EJB security model.
当使用EJB安全模型调用服务实现、会话ejb时,将实现授权处理。
The kernel usually has some sort of security model that manages access to devices, files, processes, and objects.
内核通常具有某种类型的安全模式来管理对设备、文件、进程和对象的访问。
To limit the cubes and members of a dimension that a role can access, you need to design and deploy a security model.
要限制角色可以访问的一个维度的多维数据集和成员,需要设计和部署一个安全模型。
We started with a note on the importance of security in a distributed environment and an overview of DCE security model.
我们首先强调了安全性对分布式环境的重要性,概述了DCE安全模型。
It also reviews the DB2 UDB security model, including user authentication, user and group authorization, and super users.
文中还介绍了DB 2UDB安全模型,包括用户身份验证、用户和组授权以及超级用户。
This suggests a tiered security model where the spoke nodes are the baseline and the hub is hardened, similar to a gateway.
这让人想起分层的安全模型,其中分支节点是基准,对中心加以硬化,类似于网关。
应用推荐