如果需要更改Wiki的访问控制策略,您只需更改某个规则。
Should the access control policy for the Wiki need to be changed, you only need to change a rule.
提出利用权能对资源访问控制策略进行描述,动态维护。
This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic.
这包括诸如加载和删除分类系统以及设置访问控制策略等功能。
This includes functions such as loading and removing classification systems, and setting up access control policies.
您可以设计访问控制策略,以便根据用户在特定组织中的角色对其进行授权。
You can design access control policies to grant authority to a user based on their role in a particular organization.
它还包含针对所有Cognos对象的安全名称空间信息以及访问控制策略。
It also contains security namespace information and access control policies on all the Cognos objects.
在本文后面的部分,您将看到使用简单的访问控制策略构建一个样例应用程序。
Later in the article, you'll see the simple access control policy used in building a sample application.
但是,目前我将继续向您展示如何使用Acegi配置一个简单的访问控制策略。
For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
There are two aspects included in database system security, which is access control security strategy and communication channel security.
您还将了解到如何配置Acegi,使它与目录服务交互,从而实现您的访问控制策略。
You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.
文章将着重讨论保护网络中数据的两种策略:访问控制策略和信息加密策略。
The article emphasizes on discussing the two measures to protect the datum in the network: accessing control measure and information encryption measure.
主流的访问控制技术是从系统整体考虑,提供实施访问控制策略的技术平台。
Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.
我还将展示配置acegi的方法,使它能够与目录服务器交互并实现您的访问控制策略。
I also show you how to configure Acegi to interact with the directory server to implement your access control policy.
这种方法以服务域作为访问控制策略的组织单元,简化访问控制的管理和使用。
This method employs service domain as a unit in which the access control policy is organized.
最后,证明了该细粒度协作访问控制策略关于协作系统的状态转换是保持安全的。
Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.
现在,只需了解拦截器可以拦截用户并在用户访问bean之前实现访问控制策略。
For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.
RBAC模型具有灵活性、方便性和安全性的特点,因此成为访问控制策略的首选。
RBAC model is the most popular access control strategy because of its flexibleness, convenience and security.
您还详细了解了配置Acegi 的方法,从而与LDAP目录交互实现访问控制策略。
You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.
例如,存在这样一个访问控制策略,其允许担当客户服务代表角色的所有用户执行客户管理操作。
For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
访问控制拦截器能够保证调用请求在对目标对象调用操作之前进行拦截并执行访问控制策略。
The interceptor can ensure that access control will occur before any request gets to the server operation.
自动信任协商(atn)是指通过暴露信任凭证与访问控制策略进行匹配以达到建立信任关系的目的。
Automated trust Negotiation (ATN) provides a means to establish the trust membership by disclosing and matching credentials and access control policies.
自动信任协商(ATN)是指通过暴露信任凭证与访问控制策略进行匹配以达到建立信任关系的目的。
This paper designed a supported trust management and optimal trust negotiation strategy based on analyzing trust management(TM) and automated trust negotiation(ATN) technology.
步骤3:DataPower设备通过计算用XACML编写的访问控制策略,检查是否允许用户调用所请求的服务。
Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.
介绍了自主访问控制、强制访问控制和基于角色的访问控制三种主流的访问控制策略,并进行了对比分析。
This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.
基本认证和HTTP认证提供了对受保护资源的访问控制策略,而SSL则提供对敏感数据加密传输的机制。
The basic authority and the HTTP authority provide access control strategy of the protected resources. The SSL provides mechanism for transmitting sensitive encrypted data.
分析表明,模型具有单点登录、PULL模式访问资源、用户隐私保护、访问控制策略保护、易于实现的特点。
The results showed the model with single-log-in could access to resources in PULL mode, protect the private privacy and the access control policy and could be implemented easily.
另一方面,在某些企业的访问控制策略中,时间是一个关键性因素,用户的授权被限制在预先定义的时间范围内。
On the other hand, time is a critical factor in the access control policy of some enterprise. User's authorization is restricted at predefined time periods.
访问控制策略是网络安全策略的重要组成部分,基于角色访问控制策略以其方便有效的特点日益受到人们的关注。
Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.
该模型采用基于角色的访问控制策略,实现了各业务系统间的一次登录、统一认证、统一权限管理和业务漫游功能。
And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.
该模型采用基于角色的访问控制策略,实现了各业务系统间的一次登录、统一认证、统一权限管理和业务漫游功能。
And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.
应用推荐