• 如果需要更改Wiki访问控制策略只需更改某个规则。

    Should the access control policy for the Wiki need to be changed, you only need to change a rule.

    youdao

  • 提出利用权能资源访问控制策略进行描述动态维护

    This paper describes the policy of resource access control with capability, so the policy has dynamic maintenance characteristic.

    youdao

  • 包括诸如加载删除分类系统以及设置访问控制策略功能

    This includes functions such as loading and removing classification systems, and setting up access control policies.

    youdao

  • 可以设计访问控制策略以便根据用户特定组织中的角色进行授权。

    You can design access control policies to grant authority to a user based on their role in a particular organization.

    youdao

  • 包含针对所有Cognos对象安全名称空间信息以及访问控制策略

    It also contains security namespace information and access control policies on all the Cognos objects.

    youdao

  • 本文后面的部分,看到使用简单访问控制策略构建一个样应用程序

    Later in the article, you'll see the simple access control policy used in building a sample application.

    youdao

  • 但是目前继续展示如何使用Acegi配置一个简单访问控制策略

    For the moment, however, I'll stick to showing you how to configure a simple access control policy using Acegi.

    youdao

  • 数据库系统安全性主要包括两个方面访问控制策略传输通道安全

    There are two aspects included in database system security, which is access control security strategy and communication channel security.

    youdao

  • 了解到如何配置Acegi,使它目录服务交互,从而实现访问控制策略

    You will also learn how to configure Acegi to interact with the directory service to implement your access control policy.

    youdao

  • 文章着重讨论保护网络数据两种策略访问控制策略信息加密策略

    The article emphasizes on discussing the two measures to protect the datum in the network: accessing control measure and information encryption measure.

    youdao

  • 主流访问控制技术是从系统整体考虑,提供实施访问控制策略技术平台

    Main access control technology considers the system as a whole and provides the technical platform to implement access control policy.

    youdao

  • 展示配置acegi的方法,使它能够目录服务器交互并实现访问控制策略

    I also show you how to configure Acegi to interact with the directory server to implement your access control policy.

    youdao

  • 这种方法服务作为访问控制策略组织单元,简化访问控制管理和使用。

    This method employs service domain as a unit in which the access control policy is organized.

    youdao

  • 最后证明细粒度协作访问控制策略关于协作系统状态转换保持安全的。

    Lastly, the preserving security property of the fine-grained access control policy with respect to state transition is proven.

    youdao

  • 现在只需了解拦截可以拦截用户在用户访问bean之前实现访问控制策略

    For the moment, just note that an interceptor can intercept a user's request and implement an access control policy before allowing the user to access the bean.

    youdao

  • RBAC模型具有灵活性方便性安全性特点,因此成为访问控制策略的首选。

    RBAC model is the most popular access control strategy because of its flexibleness, convenience and security.

    youdao

  • 详细了解配置Acegi 的方法,从而LDAP目录交互实现访问控制策略

    You have also learned in detail how to configure Acegi to interact with an LDAP directory and implement an access control policy.

    youdao

  • 例如存在这样一个访问控制策略其允许担当客户服务代表角色所有用户执行客户管理操作

    For example, there is an access control policy that allows all users that fulfill the customer Service Representative role to perform customer management operations.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • 访问控制拦截能够保证调用请求在对目标对象调用操作之前进行拦截并执行访问控制策略

    The interceptor can ensure that access control will occur before any request gets to the server operation.

    youdao

  • 自动信任协商(atn)指通过暴露信任凭证访问控制策略进行匹配以达到建立信任关系的目的。

    Automated trust Negotiation (ATN) provides a means to establish the trust membership by disclosing and matching credentials and access control policies.

    youdao

  • 自动信任协商ATN)是指通过暴露信任凭证访问控制策略进行匹配以达到建立信任关系的目的。

    This paper designed a supported trust management and optimal trust negotiation strategy based on analyzing trust management(TM) and automated trust negotiation(ATN) technology.

    youdao

  • 步骤3DataPower设备通过计算用XACML编写访问控制策略检查是否允许用户调用请求的服务

    Step 3: the DataPower appliance checks if the user is allowed to call the requested service by evaluating the access control policy written in XACML.

    youdao

  • 介绍自主访问控制强制访问控制基于角色访问控制三种主流访问控制策略进行了对比分析。

    This paper presents three mainstream access control strategies:discretionary access control, mandatory access control and role-based access control, and compares with each other.

    youdao

  • 基本认证HTTP认证提供受保护资源访问控制策略SSL则提供敏感数据加密传输机制

    The basic authority and the HTTP authority provide access control strategy of the protected resources. The SSL provides mechanism for transmitting sensitive encrypted data.

    youdao

  • 分析表明,模型具有单点登录、PULL模式访问资源用户隐私保护访问控制策略保护、易于实现的特点。

    The results showed the model with single-log-in could access to resources in PULL mode, protect the private privacy and the access control policy and could be implemented easily.

    youdao

  • 一方面,某些企业访问控制策略中,时间一个关键性因素用户授权限制预先定义的时间范围内

    On the other hand, time is a critical factor in the access control policy of some enterprise. User's authorization is restricted at predefined time periods.

    youdao

  • 访问控制策略网络安全策略重要组成部分基于角色访问控制策略以其方便有效特点日益受到人们的关注

    Access control policy is an important part of network security policy, and for the advantage of convenient and effective the role based access control policy attracts more extensive attention.

    youdao

  • 该模型采用基于角色的访问控制策略实现业务系统一次登录统一认证、统一权限管理业务漫游功能。

    And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.

    youdao

  • 该模型采用基于角色的访问控制策略实现业务系统一次登录统一认证、统一权限管理业务漫游功能。

    And, it implements single sign-on, uniform authentication, uniform authorization management and business systems roam between different application systems.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定