这里的ROLE如何表达? - 法律/合同 - 翻吧... ... Role-based Security Access 基于职位的安全访问 The XX application incorporates role-based and assigned permissions. XX的应用程序采用基于职位和经过分配的权限。?? The security levels include no access, read access, and write access. 安全级别包括禁止访问、读取访问和写入访问。 ...
基于1个网页-相关网页
We could potentially use standard J2EE role-based security to manage printer access.
我们可以使用标准的J2EE基于角色的安全性来管理打印机访问。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphere Application Server的安全基础结构,比如基于角色的访问控制和加密。
In AIX 6.1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
在AIX 6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
应用推荐