• The access control rule of the ACBAC model is formalized by the first order predicate logic. The realization method of the model in business process management systems is also discussed.

    文章谓词模型访问控制约束规则进行形式化描述,并讨论了模型业务流程管理系统中的实现方法

    youdao

  • You set access control on content spots and rule mappings to manage which users can change these start and end dates.

    您可以内容规则映射上通过设置访问控制管理哪些用户可以改变开始结束日期

    youdao

  • Should the access control policy for the Wiki need to be changed, you only need to change a rule.

    如果需要更改Wiki访问控制策略只需更改某个规则。

    youdao

  • It explains a user role mapping (URM) method, designs and implements a rule engine which has been adopted by a real access control system.

    描述用户角色映射(urm)的方法设计实现一种规则引擎,并将应用于实际访问控制系统

    youdao

  • An access rule represents a combination of a user's identity, an access mask, and an access control type (allow or deny).

    访问规则表示用户标识、访问访问控制类型(允许拒绝)组合

    youdao

  • It is safe to suppress a warning from this rule if you are developing an application and therefore have full control over access to the type that contains the static field.

    如果正在开发应用程序,因此包含静态字段类型具有完全访问权限可以安全地禁止显示规则发出的警告。

    youdao

  • It is safe to suppress a warning from this rule if you are developing an application and therefore have full control over access to the type that contains the static field.

    如果正在开发应用程序,因此包含静态字段类型具有完全访问权限可以安全地禁止显示规则发出的警告。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定