• Steps to implement Role based security

    实现基于角色安全性步骤

    youdao

  • IBM Cognos BI features for implementing Role based security.

    用于实现基于角色安全性IBMCognosbi特性

    youdao

  • In conjunction with Role based Security, IBM Cognos bi also offers dynamic reporting capability.

    结合基于角色安全性IBMCognosBI提供动态报告功能

    youdao

  • To create dynamic reports that implement Role based security we use the following IBM Cognos BI functionality.

    创建实现基于角色安全性动态报告使用以下IBMCognosBI功能

    youdao

  • It provides user and role based security, which is one of the most important aspects of P2P for an organization.

    能够提供用户基于角色安全保证而这对于企业级应用P 2 P重要方面

    youdao

  • Role based security is described as user-level security which focuses on the logical role of a user rather than the user's individual identity.

    基于角色安全性用户级安全性,主要关注用户逻辑角色不是个人身份。

    youdao

  • Now we will explain the method of how to create dynamic reporting based on Role based security by using one of our sample packages, "Great Outdoors Warehouse". (Figure 2).

    下面我们使用我们一个样例Great Out doorsWarehouse”展示如何根据基于角色安全性创建动态报告(见图2)。

    youdao

  • As you can see, this is clearly a more flexible solution to the problem than is trying to bend a role-based security model to fit a situation that it was not designed to handle.

    正如看到的,尝试对基于角色安全模型进行修改适应其设计时并未考虑的情况相比显然更为灵活解决方案

    youdao

  • This section briefly lists the basic steps that are necessary for role-based staffing to function properly, using the commonly used LDAP security enablement.

    部分使用常用的LDAP安全支持简要列出基于角色人员分配功能正确发挥作用必需基本步骤

    youdao

  • We could potentially use standard J2EE role-based security to manage printer access.

    我们可以使用标准J2EE基于角色的安全性管理打印机访问

    youdao

  • Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.

    安全性更改另一个主要方面,它体现在WebSphere安全性授权模型基于角色安全性的转变中。

    youdao

  • Determining the roles at your site that require access to WebSphere MQ commands, and then implementing role-based security can provide a way to group the commands.

    首先确定网站上需要访问WebSphereMQ命令然后实现基于角色安全性,从而对命令进行分组

    youdao

  • In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.

    AIX 6.1中,IBM引入了基于角色访问控制(RBAC),解决了sudo许多安全和审计问题

    youdao

  • WebSphere Portal Server enables quick integration of applications and content in role-based applications with integrated search and security mechanism.

    WebSpherePortalServer可以快速地把应用程序内容集成基于角色的应用程序中,提供集成的搜索安全机制。

    youdao

  • It's extremely simple to deploy to your Web application using DWR, and DWR's security features can be integrated with a J2EE role-based authentication system.

    使用DWR部署Web应用程序极为简单而且DWR的安全性特性可以J2EE基于角色验证系统集成

    youdao

  • To activate the role-based human task actions, one of the security options (LDAP, Local OS, or Custom) needs to be enabled.

    激活基于角色人工任务操作需要启用安全选项(LDAPLocalOSCustom)之一

    youdao

  • Reporting Services security uses a familiar role-based model.

    ReportingServices安全性使用熟悉的基于角色的模型

    youdao

  • Authorization Support: Handled a variety of ways whether you use Windows authentication, thread principals, ASP.NET role-based security or your own.

    授权支持可以处理各种授权方式不管使用Windows验证线程安全主体、ASP.NET基于角色安全模式或者自己自定义的。

    youdao

  • Role-based security is the most straightforward way to organize commands for security purposes.

    基于角色安全性组织命令、实现安全性简单方法

    youdao

  • Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.

    基于角色安全性保护企业信息资产一个不错的方法而且可能想象容易实现

    youdao

  • Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    youdao

  • As a sort of security mechanism, Role Based Access Control (RBAC) technique has been one of the hotspots in current research.

    基于角色访问控制(RBAC)作为安全机制当前研究热点之一

    youdao

  • As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.

    作为基于标签访问控制(LBAC)的DB 2 Viper 2数据库角色增强一部分可以对一个角色授予收回安全标签豁免权

    youdao

  • Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    youdao

  • Access control is a basic technology in network security. It includes the role based access control and the task based access control, etc.

    访问控制技术网络安全一项基本技术,主要包括基于角色访问控制基于任务的访问控制等技术。

    youdao

  • This paper provides an overview of security in the. NET Framework and in particular, role-based security, code access security, verification, stack walking, isolated storage and cryptography.

    文章提供了NET框架安全性方面概述具体讲述基于角色安全性、代码访问安全性、验证堆栈审核、隔离存储、加密等方面的核心安全技术。

    youdao

  • The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.

    可采用点登陆、PKI认证授权基于角色权限分配策略、利用应用网关访问资源,开发适合本系统工作流访问机制等措施确保信息平台安全

    youdao

  • The role specification AC and role assignment AC are introduced, the role-based PMI architecture and the role-based PMI security model for E-government is discussed and researched in the paper.

    论文介绍了角色规范属性证书角色指派属性证书,讨论了基于角色的PMI体系结构,探讨了基于角色PMI的电子政务安全模型

    youdao

  • For a given application domain, the host can change the default role-based security policy and set a default security principal.

    对于给定应用程序宿主更改默认基于角色安全性策略设置默认安全主体

    youdao

  • For a given application domain, the host can change the default role-based security policy and set a default security principal.

    对于给定应用程序宿主更改默认基于角色安全性策略设置默认安全主体

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定