网站首页  词典首页

请输入您要查询的英文单词:

 

单词 role-based
释义

role-based

  • 网络基于角色;以角色为基础;角色基础
1.
基于角色
基于角色Role-based)的应用界面:使得每个用户登录之后,会有相应的工作区,以底层的工作流引擎作为支撑,通过消息 …
www.e-works.net.cn
2.
以角色为基础
同样提供以角色为基础 (Role-based) 的完善安全权限控管机制 集中式的简易管理维护机制 三、项目部署基本架构 3.1 BI项目服 …
product.e-works.net.cn
3.
角色基础
容易管理的角色基础(Role-Based)的安全控管机制如同Analyzer,Analyzer Mobile同样能够通过角色来设置用户读取内容(包括 …
www.strategycompanion.com.cn
4.
角色为主
角色为主(Role-Based)您答对了!
xuelele.com.tw
5.
角色式
Bluesocket 独特的「角色式 (role-based) 」方法提供相当便利的管理可以给予不同类型的使用者不同的权限, Bluesocket 无线 …
iphonenotes.blogspot.com

例句

释义:
1.
This information is then consolidated in one easy-to-use role-based interface, the IBM Tivoli Enterprise Portal.
然后,这种信息被合并到一个简单易用的基于角色的界面:IBMTivoliEnterprisePortal。
www.ibm.com
2.
This platform can be accessed through a variety of tools, which present various role-based perspectives of the centralized information.
该平台可以通过各种工具访问,提供了各种基于角色的集中化信息透视图。
www.ibm.com
3.
To activate the role-based human task actions, one of the security options (LDAP, Local OS, or Custom) needs to be enabled.
要激活基于角色的人工任务操作,需要启用安全选项(LDAP、LocalOS或Custom)之一。
www.ibm.com
4.
In terms of security, role-based rights management enhances the security of the system in the run.
在安全方面,采用基于角色的权限管理,增强了系统运行的安全性。
www.boshuo.net
5.
This rest of this article describes the first of these fundamental concepts, how Projects provide a role-based context for work.
本文余下的内容将描述这些基本概念中的第一个,项目如何为工作提供基于角色上下文环境。
www.ibm.com
6.
Role-based access control is one of the effective means to protect resources in a security system.
基于角色的访问控制是安全系统中保护资源的有效手段之一。
www.ceps.com.tw
7.
Prior to this command, you needed to work with Role-Based Access Control (RBAC) to help remedy the problem of setuid and setgid programs.
在有这个命令之前,您需要使用Role-BasedAccessControl(RBAC)来帮助纠正setuid和setgid程序的问题。
www.ibm.com
8.
Another benefit of using role-based communities is to provide flexible access to the tools that are available within a given situation.
使用基于角色的社区的另一个好处是可以灵活地访问给定情形中可用的工具。
www-128.ibm.com
9.
Role-based security is a great way to protect your organization's information assets, and it's probably easier to implement than you think.
基于角色的安全性是保护企业信息资产的一个不错的方法,而且它可能比您想象的更容易实现。
www.ibm.com
10.
Through role-based security, Reporting Services provides an authorization model, but it does not include an authentication component.
通过基于角色的安全性,ReportingServices提供了一种授权模型,但它并不包含身份验证组件。
msdn2.microsoft.com
1.
When used with a minimal number of systems by experienced admins, it's an adequate method of implementing role based access controls.
如果有经验的管理员在系统不多的情况下使用,它是实现基于角色访问控制的完备方法。
www.bing.com
2.
To revert, you will have to reinstall Reporting Services and manually re-apply any role-based security for your Windows users.
若要进行恢复,您必须重新安装ReportingServices并手动为Windows用户重新应用所有基于角色的安全性。
msdn2.microsoft.com
3.
These role-based notification groups let administrators receive notifications for only the set of servers that they are responsible for.
这些基于角色的通知组允许管理员只接收到他们所负责的服务器集的通知。
technet.microsoft.com
4.
An imperative check is useful when many methods or other assemblies in the application domain must make role-based determinations.
当应用程序域中的许多方法或其他程序集必须做出基于角色的决定时,命令式检查是有用的。
msdn2.microsoft.com
5.
For a given application domain , the host can change the default role- based security policy and set a default security principal .
宿主可以为给定的应用程序域设置基于角色的安全策略和当前安全主体。
www.bing.com
6.
However, in that case, the role-based staffing functionalities do not really take effect.
不过,在此情况下,基于角色的人员分配职能实际上不受影响。
www.ibm.com
7.
Role-based access on a need-to-use basis can be implemented as part of the central management infrastructure.
基于角色的访问建立在适当授权的基础上,可以作为中央管理基础设施的一部分被实现。
www.ibm.com
8.
The these use role based access control model, design a set of logical data model and propose the basic algorithm for access database.
文中在数据访问控制方面采用了基于角色的安全策略,设计了数据访问控制的逻辑模型和基本方法。
www.magsci.org
9.
Gets or sets a value indicating whether the current principal has been authenticated by the underlying role-based security provider.
获取或设置一个值,该值指示当前用户的身份是否已经过基于角色的基础安全提供程序的验证。
msdn2.microsoft.com
10.
Both code access security and role-based security are implemented using a common infrastructure supplied by the common language runtime.
代码访问安全性和基于角色的安全性都是用公共语言运行库提供的一个通用结构实现的。
msdn2.microsoft.com
1.
While this example is extremely simple, it illustrates the behavior associated with a role-based demand.
尽管此示例极其简单,但它阐明了与基于角色的请求相关的行为。
msdn2.microsoft.com
2.
A third factor is role-based access for a variety of user roles, including non-technical policy analysts.
第三个因素是各种用户角色需要基于规则的访问,包括非技术性策略分析师。
www.ibm.com
3.
A framework of Role-Based Access Control and its implementation mechanism and principle are introduced in detail in this paper.
介绍一种基于角色的访问控制框架,详细阐述了该框架的实现原理和工作机制。
www.ceps.com.tw
4.
Role Based Access Control (RBAC) has been proposed as an alternative approach to the traditional access control mechanism.
基于角色的访问控制(RBAC)被推荐来代替传统的访问控制模型。
www.ceps.com.tw
5.
The interface is role-based, displaying only those processes and tasks that are associated with the group that the user belongs to.
该界面是基于角色的,只显示与用户所属的组相关的流程和任务。
www.ibm.com
6.
It will be served with a Workflow-Engine and a role-based access-control.
它将可以作为一个工作流引擎,以及一个基于角色的访问控制器。
osl.bsw.net.cn
7.
Enterprise encyclopedias are databases that have role-based access control and instance-level access control.
企业百科全书是拥有基于角色控制以及实例层次控制的数据库。
www.ibm.com
8.
These tasks comprise the entire set of operations that are available in role-based security.
这些任务组成了基于角色的安全性中可用的完整操作集。
msdn2.microsoft.com
9.
when using this mechanism , it is highly recommended that some form of role - based access check be performed.
使用此机制时,强烈建议执行某种形式的基于角色的访问检查。
www.ichacha.net
10.
Provides samples that demonstrate object construction, object pooling, queued components, and role-based security.
提供了说明对象构造、对象池、排队组件以及基于角色的安全性的示例。
msdn2.microsoft.com
1.
IBM WebSphere Portal provides core portal services that aggregate applications and content and delivers them as role-based applications.
IBMWebSpherePortal提供可聚合应用程序和内容的核心门户服务,并以基于角色的应用程序形式交付它们。
www.ibm.com
2.
And an implementation of role-based access control is given to solve the problem of the access control in examination system.
并就考试系统的访问控制问题,给出了基于角色访问控制模型的权限设计实现。
www.dictall.com
3.
Reporting Services uses role-based security to control access to items that are stored on a report server.
ReportingServices使用基于角色的安全性控制对报表服务器上存储的项的访问。
msdn2.microsoft.com
4.
Role-based authorization of transaction protocol messages is supported only for WebSphere-to-WebSphere interactions.
传输协议消息的基于角色的授权仅支持WebSphere到WebSphere的交互。
www.ibm.com
5.
Each user simulated through Rational Performance Tester was assigned a user role based on the set of workloads shown in Table 6 and Table 7.
每一个通过RationalPerformanceTester模拟的用户,会基于表6和表7中所显示的工作负荷来分配给一个用户角色。
www.ibm.com
6.
Therefore, the workload of this exercise simulates a series of role-based scenarios that attempts to mimic simple real-world user tasks.
因此,该练习的工作负荷模拟一系列基于角色的场景,这些场景会试着模拟一些简单的真实用户操作。
www.ibm.com
7.
Provides links to security topics in the. NET Framework, including topics for code access security, role-based security, and cryptography.
提供指向.NETFramework中有关安全的主题的链接,包括关于代码访问安全、基于角色的安全以及加密的主题。
msdn2.microsoft.com
8.
Once complete, the user model can be fed through the supplied generator to generate a full role-based J2EE web application.
一旦完成,用户模型可以通过供应的生成器来生成一个完整的基于角色的J2EEweb应用程序。
www.ibm.com
9.
This paper presents a role-based delegation model based on the concept of role delegation server.
在委托服务器概念的基础上,加入了对冲突角色的限制,使基于角色的委托模型更加完善。
www.ceps.com.tw
10.
Security is another major area of change with the transition from the WebSphere security authorization model to role-based security.
安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
www-128.ibm.com
1.
The role-based security model supports a permission object similar to the permission objects found in the code access security model.
基于角色的安全性模型支持与代码访问安全性模型中的权限对象类似的权限对象。
msdn2.microsoft.com
2.
Hosts can set both code-access security policy and role-based security policy for a domain.
宿主可以为域设置代码访问安全策略和基于角色的安全策略。
technet.microsoft.com
3.
How do I customize these role-based My Site templates and deploy them in more specific scenarios and organizations?
如何在更具体的方案和组织中自定义和部署这些基于角色的“我的网站”模板?
office.microsoft.com
4.
Role-based security is central to the security model of Reporting Services and understanding its implications is important.
基于角色的安全性是ReportingServices安全模型的核心,了解其含义非常重要。
technet.microsoft.com
5.
But he adds that if role-based access control is enforced too strictly, employees have too little data to do their jobs.
同时MrJohnson也提到如果过于严苛的执行以职位为基础的权限管理,员工将仅仅获取微少的工作所需数据。
www.ecocn.org
6.
Our clients take advantage of both role-based permission and fine-grained access control.
我们的客户同时利用基于角色的权限和细粒度访问控制。
www.ibm.com
7.
Workplace Designer components support the role-based security model of Workplace applications.
WorkplaceDesigner组件支持Workplace应用程序基于角色的安全模型。
www-128.ibm.com
8.
Provides information about Web application security, code-access security, and role-based security.
提供有关Web应用程序安全、代码访问安全和基于角色的安全的信息。
msdn2.microsoft.com
9.
Describes. NET Framework code access security, role-based security, security policy, and security tools.
描述.NETFramework代码访问安全性、基于角色的安全性、安全策略和安全工具。
msdn2.microsoft.com
10.
However, this book describes the setup by focusing more on the role-based approach.
无论如何,本书描述的安装更注重基础。
blog.sina.com.cn
1.
Applications that implement role-based security grant rights based on the role associated with a principal object.
实现基于角色的安全性的应用程序将基于与主体对象关联的角色来授予权限。
msdn2.microsoft.com
2.
The tool lets administrators assign references to particular users or groups, making redirection role-based.
该工具允许管理员将引用指定给特殊用户或组,使重定向基于角色。
www.ibm.com
3.
Role-based permissions can be combined with fine-grained access control for each image, pattern, virtual system, and more.
基于角色的权限可以与针对每个映像、模式、虚拟系统等的细粒度访问控制结合起来。
www.ibm.com
4.
Role-based record types enable users to follow a more streamlined CM process.
基于角色的记录类型让用户经历更流线型的CM过程。
www.ibm.com
5.
This allows the objects to remain ignorant about certain infrastructure and plumbing details, like transactionality and role-based security.
这允许对象对某种基础架构和管线(plumbing)细节一无所知,如事务和基于角色的安全。
blog.163.com
6.
For the use case in this article, we'll build a role-based service subscription at a medical clinic called AcmeOrg.
对于本文中的用例,我们将构建一家名为AcmeOrg的医疗诊所中的基于角色的服务订阅。
www.ibm.com
7.
The role-based templates are available at no additional charge, though a quick registration is required for download.
虽然下载基于角色的模板时需要快速注册,但不需要支付额外费用。
office.microsoft.com
8.
The management is role-based, with multilanguage support and multiple administrator and user levels.
管理是基于角色的,支持多语种、多管理员和用户级别。
www.bing.com
9.
Role-based security checks have slightly different semantics than code access security checks.
基于角色的安全检查与代码访问安全检查在语义上稍有不同。
msdn.microsoft.com
10.
Mergers and acquisitions, user preferences, and role-based design drive this requirement.
并购、用户喜好和基于角色的设计促成了这种需求。
www.ibm.com
1.
Visual Studio Team System role-based clients and Team Explorer will operate correctly with Terminal Server.
VisualStudioTeamSystem基于角色的客户端和团队资源管理器可在终端服务器上正常运行。
msdn2.microsoft.com
2.
Access to enterprise data sources through automated role-based entitlement systems.
通过基于角色的自动化授权系统实现对企业数据的访问。
www.ibm.com
3.
To enable role-based security, disable Anonymous access for the report server virtual directory.
若要启用基于角色的安全性,请禁用报表服务器虚拟目录的匿名访问。
technet.microsoft.com
4.
To better understand role-based communities, it is helpful to look at the implementation in the application template editor.
要更好地理解基于角色团体,了解一下应用程序模板编辑器的实施过程是很有帮助的。
www-128.ibm.com
5.
The ability to set the current principal can trick role-based security.
设置当前主体的能力可以欺骗基于角色的安全。
msdn2.microsoft.com
6.
Object, depending on whether code must repeatedly perform role-based validation or must perform it only once.
对象的方法,具体取决于代码是必须重复执行基于角色的验证还是只需执行一次验证。
msdn2.microsoft.com
7.
Business space is a secure web application that supports role based authentication and access.
业务空间是一种安全的web应用程序,它支持基于角色的验证和访问。
www.ibm.com
8.
If you enable Anonymous access for the report server virtual directory, you will effectively disable role-based security.
如果启用报表服务器虚拟目录的匿名访问,您将能够有效禁用基于角色的安全性。
technet.microsoft.com
9.
Describes. NET Framework role-based security in detail and provides instructions for using it in your code.
详细描述.NETFramework基于角色的安全性,并提供关于在代码中使用此安全性的说明。
msdn2.microsoft.com
10.
Role-based authentication file system has enhanced the security of resources and the extensive share greatly.
基于角色认证的文件系统大大提高了资源的安全性与广泛共享性。
www.ceps.com.tw
1.
Role-based security enables a component to identify current users and their associated roles at run time.
利用基于角色的安全策略,组件可以在运行时识别当前用户及其关联角色。
msdn2.microsoft.com
2.
A common framework of role-based development tooling embodying MDA enables the design and development of integration artifacts.
包含MDA、基于角色的开发工具通用框架允许设计和开发各种集成构件。
www.ibm.com
3.
You can combine standard and custom views to create role-based dashboards to meet any business need.
您可以合并标准视图和自定义视图,创建基于角色的仪表板,进而满足任何业务需求。
www.ibm.com
4.
Role-based authorization provides access to resources based on the fact that the user is a member of some class of users.
基于角色的授权基于用户是某类用户的成员这一事实提供对资源的访问。
www.ibm.com
5.
Centrally administered role-based access control is a critical requirement of all large enterprises.
集中管理的基于角色的访问控制是所有大型企业的关键需求。
www.ibm.com
6.
A name to match against that provided by the underlying role-based security provider.
与基于角色的基础安全提供程序提供的名称匹配的名称。
msdn2.microsoft.com
7.
Active Packets accessing to the resources are under the control of dynamic Role Based Access Control and Task Based Access Control.
对访问节点的主动包进行基于角色和基于任务的动态访问控制。
www.boshuo.net
8.
Role-based session management on the client is accomplished using tag suffixes or prefixes.
客户端上基于角色的会话管理是使用标记后缀和前缀来完成的。
www.ibm.com
9.
Configure role-based security that determines access to items and operations.
配置基于角色的安全性,确定对项和操作的访问权限。
msdn2.microsoft.com
10.
What languages are the role-based My Site templates available in?
基于角色的“我的网站”模板有哪些语言版本?
office.microsoft.com
1.
Role-based authorization categorizes into roles the set of actions that a user or group can perform.
基于角色的授权将角色分为用户或组可以执行的操作组。
msdn2.microsoft.com
2.
Application role-based applications must use stored procedures instead of general queries.
基于应用程序角色的应用程序必须使用存储过程而不是常规查询。
technet.microsoft.com
3.
Are the role-based My Site templates supported by Microsoft?
Microsoft是否支持基于角色的“我的网站”模板?
office.microsoft.com
4.
Another approach to controlling access is role-based access control (RBAC).
另一种控制访问的方法是基于角色的访问控制(RBAC)。
www.ibm.com
5.
Will bring more value to the role based on your work experience than an untested junior candidate.
与一个未经证明的低资历的候选人相比,你的工作经验能给那份工作带来更大的价值。
blog.sina.com.cn
6.
This paper provides an access control mechanism within collaborative CAD, based on a technique we call role-based viewing.
提出了协同CAD中信息存取的机制,这种机制是以基于角色的视图技术为基础的。
www.ceps.com.tw
7.
Role-based security can also be used when an application requires multiple approvals to complete an action.
当应用程式需要多重许可来完成动作时,也可以使用以角色为基础的安全性。
technet.microsoft.com
8.
After you deploy the model to the report server, you can assign role-based security permissions.
在将模型部署到报表服务器后,可以分配基于角色的安全权限。
msdn2.microsoft.com
9.
Use role-based security to control access to folders, reports, and resources.
基于角色的安全性用于控制对文件夹、报表和资源的访问。
msdn2.microsoft.com
10.
Gets a value that indicates whether role-based security is active in the current context.
获取一个值,该值指示基于角色的安全性在当前上下文中是否处于活动状态。
msdn2.microsoft.com
1.
Where are the role-based My Site templates available?
从何处可以获得基于角色的“我的网站”模板?
office.microsoft.com
2.
The following example illustrates role-based permission lookup.
接下来的范例向您展示了基于角色权限的查找。
www.ibm.com
3.
Role-based viewing enables role-based access control through geometric partitioning of 3D models.
通过对3D模型的几何分割,使基于角色的访问控制成为可能。
www.ceps.com.tw
4.
The process engine provides secure (role based) access to critical process data.
处理引擎提供了对关键流程数据的安全(基于角色)访问。
www.ibm.com
5.
Common workflow is a role-based change management system design.
通用工作流是基于角色的变更管理系统设计。
www.ibm.com
6.
The role-based security choices I make in RPM will also be repeatable.
我在RPM中建立的基于角色的安全选择权将可以被重复。
www.ibm.com
7.
Reporting Services security uses a familiar role-based model.
ReportingServices安全性使用熟悉的基于角色的模型。
blog.sina.com.cn
8.
Is there any charge to download the Role-Based Templates for SharePoint My Sites?
下载基于角色的SharePoint“我的网站”模板是否需要付费?
office.microsoft.com
9.
Discusses how to work with application authorization in the. NET Framework and how to use role-based security.
讨论如何在.NETFramework中使用应用程序授权以及如何使用基于角色的安全性。
msdn2.microsoft.com
10.
Role-based access control sounds fine in theory but is difficult in practice.
权限管理理论上可行但实际操作困难重重。
www.ecocn.org
1.
Usually the discusses on restriction of role-based access control (RBAC) models were based on theirs non-time property.
以往对于RBAC访问控制模型的约束的讨论多是基于非时间特性的。
www.ceps.com.tw
2.
A total of seven role-based My Site templates are available for download.
共有七个基于角色的“我的网站”模板可供下载。
office.microsoft.com
3.
While role-based repositories are more complex to set up, they can greatly simplify the end-user installation experience.
尽管基于角色的资料库变得越来越难于设置,但他们可以极大地简化终端用户的安装难度。
www.ibm.com
4.
Customizing the UI to remove links and menu options is very analogous to role-based authorization.
自定义UI以删除链接和菜单选项的做法与基于角色的授权非常相似。
www.ibm.com
5.
Gets or sets the current principal (for role-based security).
获取或设置当前主体(对基于角色的安全性而言)。
msdn2.microsoft.com
6.
What role-based editions you want to install on the client computers.
要在客户端计算机上安装哪些基于角色的版本。
msdn2.microsoft.com
7.
The common language runtime provides support for role-based authorization based on a Windows account or a custom identity.
公共语言运行库根据Windows帐户或自定义标识提供基于角色的授权支持。
msdn2.microsoft.com
8.
Setting up role-based security is easier than most people think.
设置基于角色的安全性比大部分人所想的更轻松。
www.ibm.com
9.
Role-based security is the most straightforward way to organize commands for security purposes.
基于角色的安全性是组织命令、实现安全性最简单的方法。
www.ibm.com
10.
What roles will be covered by the role-based My Site templates?
基于角色的“我的网站”模板将包括哪些角色?
office.microsoft.com
1.
Authorized users can configure site-level settings, determine who can access a site or page, set role-based access to controls, and so on.
授权用户可以配置站点级设置、确定谁可以访问站点或页、设置对控件的基于角色的访问等。
msdn2.microsoft.com
2.
Check whether Chris has the required role-based permission.
检查Chris是否拥有基于角色的权限。
www.ibm.com
3.
Then, the paper describes several typical Role Based Access Control models, at the same time analyzes and compares them.
然后,描述了几种具有代表性的基于角色的访问控制模型,并对这几种访问控制模型进行了分析比较。
www.fabiao.net
4.
We could potentially use standard J2EE role-based security to manage printer access.
我们可以使用标准的J2EE基于角色的安全性来管理打印机访问。
www.ibm.com
5.
Do the role-based templates take advantage of Business Data Catalog?
基于角色的模板是否利用业务数据目录?
office.microsoft.com
6.
It uses a directory-based model and role-based security.
它使用一个基于目录的模式和一种基于角色的安全性。
osl.bsw.net.cn
7.
For more examples, see Figure 2: A role-based view of selected products with communications industry features.
要参考更多的案例,请看图2:一个带有通信行业特征的选定产品的基于角色的视图。
www.ibm.com
8.
It provides user and role based security, which is one of the most important aspects of P2P for an organization.
它能够提供用户和基于角色的安全保证,而这对于企业级应用的P2P是最重要的一个方面。
www.bing.com
9.
This is an exciting, challenging and diverse Executive Assistant role based in our Beijing office.
这是一个机遇与挑战并存的职位,也富有多样性。该职位主要工作地点在北京。
www.gao8dou.com
10.
Role-Based Access Control has most important influence among all access control models.
而基于角色的访问控制(RBAC)是最具影响的高级访问控制模型。
kns50.chkd.cnki.net
1.
In AIX 6. 1, IBM introduced Role Based Access Control (RBAC), which addresses many of the security and auditing concerns of sudo.
在AIX6.1中,IBM引入了基于角色的访问控制(RBAC),这解决了sudo的许多安全和审计问题。
www.ibm.com
2.
Role-based security applies security permissions based on role.
基于角色的安全性基于角色应用安全权限。
msdn2.microsoft.com
3.
Role-based separation of duties.
基于角色的责任分离。
www.ibm.com
4.
Demonstrates the use of role-based security.
演示基于角色的安全设置的使用。
msdn2.microsoft.com
5.
role based dashboards provide relevant information to team members , such as unassigned tasks and performance history.
以角色为基础的仪表板可以为工作小组成员提供相关的资讯,例如未指派的任务和表现记录。
www.ichacha.net
6.
Role-based security on a model (that is, the ability to view a model in the report server folder hierarchy).
对模型设置的基于角色的安全性(也就是在报表服务器文件夹层次结构中查看模型的能力)。
msdn2.microsoft.com
7.
Describes three kinds of principals supported by. NET Framework role-based security.
描述受.NETFramework基于角色的安全性支持的三类主体。
msdn2.microsoft.com
8.
A business component can take part in this role-based approach by defining its own roles, domain roles.
一个业务组件可以通过定义自己的角色域角色,参与这个基于角色的方法。
www.ibm.com
9.
We try to fit a role based on society and other peoples expectations.
我们还试图使自己符合社会和他人期望的角色。
www.bing.com
10.
Additional role-based assistance is included in the various "InfoCenters" included in SQL Server Books Online.
其他基于角色的帮助包含在SQLServer联机丛书中的各种“信息中心”中。
msdn2.microsoft.com
1.
After your model is published, you might want to assign role-based security permissions in SQL Server Management Studio.
在发布模型后,您可能需要在SQLServerManagementStudio中分配基于角色的安全权限。
msdn2.microsoft.com
2.
WPARs also work very well with Role-Based Access Control (RBAC), which is another important innovation in AIX 6. 1.
WPAR还可以和AIX6.1中的另一个重要创新——基于角色的访问控制(RBAC)——进行很好地协作。
www.ibm.com
3.
Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems
在角色访问控制系统中实现职责分离的方法
168.160.184.82:8080
4.
The research and realization of the office automated system on the basis of Role-Based Access Control
基于角色访问控制的办公自动化系统的研究与实现
ilib.cn
5.
Role-based security on the report that uses the model as a data source.
对使用模型作为数据源的报表设置的基于角色的安全性。
msdn2.microsoft.com
6.
provides an overview of the authorization process used in . net framework role - based security
提供关于.netframework基于角色的安全性中使用的授权过程的概述。
www.ichacha.net
7.
Authorization Supported Role-Based Access Control Model and Its Implementation
支持授权的基于角色的访问控制模型及实现
www.ilib.cn
8.
Research and Implementation of an Extended Administrative Role-Based Access Control Model
基于角色的扩展可管理访问控制模型研究与实现
www.ilib.cn
9.
Acquisition and Role-Based Representation of "Attention" Psychological Commonsense
基于角色的“注意”类心理常识的获取及表示
service.ilib.cn
10.
Role-based hierarchical collaborative awareness model for synchronous cooperation
基于角色的层次型同步协作感知模型
service.ilib.cn
1.
Role-based speculative concurrency control scheme for collaborative virtual environment
基于角色的协同虚拟环境并发控制投机策略
www.ilib.cn
2.
Design and Implementation of a Practical Role-based Access Control Model
一种实用的基于角色访问控制系统设计与实现
service.ilib.cn
3.
Role-based Administration of Authorization Model and Its Application
基于角色的授权管理模式及应用
ilib.cn
4.
Specification of role-based authorization constraints in workflow management systems
基于角色的工作流授权约束规格说明
ilib.cn
5.
Research on Role-Based Workflow Supporting Dynamic Inter-Organizational Business Processes
基于角色的动态跨组织商业过程的工作流研究
ilib.cn
6.
role-based persist and improvement of professional knowledge and responsibility of journalists;
坚持角色本位,提高新闻工作者职业素养和责任感;
www.fabiao.net
7.
Role-Based Constrained Access Control Model and Implement Supported by Constraints among Permissions
权限约束支持的基于角色的约束访问控制模型与实现
ilib.cn
8.
Role-Based Access Control Model and its Implementation in Operating System
基于角色访问控制模型及其在操作系统中的实现
ilib.cn
9.
Research and Implementation of An Extended Role-based Access Control Model
一种扩展角色访问控制模型的研究与实现
ilib.cn
10.
Design and Implementation of Specification for Role-Based Policy Management of Distributed System
基于角色的分布式策略管理规范的设计与实现
www.ilib.cn
1.
Study of Role-Based Access Control in Permission Management
基于角色的访问控制在权限管理中的研究
ilib.cn
2.
Design and Realization of a Method for Role Based Safe Access Control
基于角色的数据库安全访问控制方法的设计与实现
www.ilib.cn
3.
Implementing Capabilities on the Role-Based Authorization Framework
在角色定权框架下实现能力机制
www.ilib.cn
4.
An Improved Method to Enforce BLP Model and Its Variations in Role-Based Access Control
一种改进的以基于角色的访问控制实施BLP模型及其变种的方法
ilib.cn
5.
Consistent Integration Service for Role-Based Grid Authorization Policies
基于角色的网格授权策略的一致集成服务
scholar.ilib.cn
6.
Role-based cooperating fuzzy comprehensive evaluation
基于角色的协同模糊综合评判
ilib.cn
7.
Design and Realization of Role-based Engineering Database Security Management
基于角色的工程数据库安全管理的设计与实现
www.ilib.cn
8.
Design and Implementation of Role-based Access Control in a Teaching System
基于角色控制的教学权限访问系统的设计与实现
service.ilib.cn
9.
A Dynamic Three- dimensional Role- based Organizational Structure Model
基于角色的动态三维组织结构模型
service.ilib.cn
10.
A Tree Role-based Access Control Strategy and Its Implementation
基于树型角色的访问控制策略及其实现
www.ilib.cn
1.
A Role Hierarchy Model for Role-Based Access Control and Its Application
扩充角色层次关系模型及其应用
ilib.cn
2.
An Adaptive Architecture for Intrusion-tolerant Databases on Role-based Access Control
基于角色访问的数据库自适应容侵结构
www.ilib.cn
3.
Implementation of Role- based Access Control in Authentication Manager
基于角色访问控制在授权管理器中的实现
www.ilib.cn
4.
Implementation of Role-based Access Control in Distributed Environment
分布式环境下基于角色访问控制的实现
www.ilib.cn
5.
Research and Implementation of Role-Based Domain and Type Enforcement Access Control Model
基于角色的域-类型增强访问控制模型研究及其实现
ilib.cn
6.
Role-based secure authorization model for trusted digital rights management
基于角色的可信数字版权安全许可授权模型
www.ilib.cn
7.
Research on Extension and Implementation Mechanism for Role-Based Access Control
基于角色的访问控制模型的扩充和实现机制研究
www.ilib.cn
8.
Quantified-Role Based Controllable Delegation Model
基于量化角色的可控委托模型
www.ilib.cn
9.
A Role-based Collaborative Software Development Framework
一种基于角色的协同软件开发框架
www.ilib.cn
10.
Research and Application of Role-Based Access Control Technology in Network Security
角色访问控制技术在网络安全中的研究和应用
ilib.cn
1.
Fine-grained Coalition Role-Based Access Control for Grid Computing Environment
网格计算环境下基于角色的细粒度协作访问控制
www.ilib.cn
2.
Analysis and Comparison of Administrative Role-Based Access Control Model
基于角色的访问控制管理模型的分析与比较
www.ilib.cn
3.
Role-Based Two Level Database Access Control Mechanism and Implementation
基于角色的两级数据库访问控制机制及其实现
www.ilib.cn
4.
Workflow Dynamic Authorization Model with Role-Based Access Control
应用角色访问控制的工作流动态授权模型
www.ilib.cn
5.
A Role-Based Approach for Decentralized Dynamic Service Composition
一种基于角色的分布式动态服务组合方法
www.ilib.cn
6.
A Role-based Access Control Model and Its Implementation
一种基于角色的访问控制模型及其实现
www.ilib.com.cn
7.
Research and application of Role-Based Access Control in Privilege Management
基于角色访问控制在权限管理中的研究与应用
ilib.cn
8.
Research on a Model of Component-Role-Based in the Component Assemble Testing Method
基于构件角色模型的组装检测方法探讨
www.ilib.com.cn
9.
Realization of Mandatory Access Control in Role-based Protection Systems
强制访问控制在基于角色的保护系统中的实现
www.ilib.cn
10.
Constraint Specification for the Model of Role-Based Access Control
一种基于角色访问控制模型的约束规范描述
ilib.cn
1.
Research on Role-based Authority Distribution of Login User in HIS
HIS中基于角色的用户登录权限分配研究
service.ilib.cn
2.
Role-based Access Control in Network Information Distribution
网络信息发布中基于角色的控制
service.ilib.cn
3.
Research on extension to role-based access control mechanism on workflow platform
基于角色的访问控制机制在工作流平台下扩展的研究
ilib.cn
4.
Role-Based Authorization Constraint with Time Character
带时间特性的角色授权约束
www.ilib.cn
5.
User authentication and role-based authorization,
用户认证与基于角色的授权,
blog.csdn.net
6.
A Role-Based Delegation Access Control Model for Virtual Organization in Service Grid
一种基于角色代理的服务网格虚拟组织访问控制模型
www.ilib.cn
7.
Research and Implementation of Role-Based Access Control Framework
基于角色的访问控制框架的研究与实现
www.ilib.cn
8.
Research on Role-based Framework for Collaborative Virtual Subject
基于角色的协同虚拟主体框架模型研究
ilib.cn
9.
Role Based Access Control for Web Resources Using Attribute Certificate
利用属性证书实现Web资源的角色访问控制
ilib.cn
10.
Application of Role-based Access Control in Technology Transaction System on Web
基于角色的访问控制在网上技术交易系统中的应用
ilib.cn
1.
Design and Implementation of Role-based Access Control in Online Teaching System
网上教学系统的角色控制的设计与实现
www.ilib.cn
2.
Formal Specification for Object-oriented Model of Role-based Access Control
对象式基于角色访问控制模型的规范化描述
www.ilib.cn
3.
Application of Role-Based Access Control in Management Information System
角色访问控制技术在管理信息系统中的应用
ilib.cn
4.
Research and Application about Extended Role-Based Access Control Mode
基于扩展角色访问控制模型的应用研究
service.ilib.cn
5.
A Role-Based Research on Dynamic Agent Service Coordination Mechanisms
基于角色的主体服务动态协调机制研究
www.ilib.cn
6.
Security Analysis on Administrative Model of Role-Based Access Control
基于角色访问控制管理模型的安全性分析
www.ilib.cn
7.
Application of Object-Oriented Techniques to Role-based Access Control
面向对象技术在基于角色的访问控制中的应用
service.ilib.cn
8.
Study on the Application of Role-based Access Control in Workflow Management System
基于角色访问控制在工作流管理系统中的应用研究
service.ilib.cn
9.
A Model of Task-Role Based Access Control and Its Application
一种基于任务和角色的访问控制模型及其应用
ilib.cn
10.
Application Research for Role Based Access Control Technique in E-Learning
基于角色的访问控制在网络教育中的应用研究
www.ilib.cn
1.
Reusable Total Solution of Role- Based Privilege Management
基于角色的权限管理可重用解决方案
ilib.com.cn
2.
Implementation and Application of Role-Based Access Control
基于角色的访问控制的实现与应用
www.ilib.cn
3.
A Temporal Role-Based Administration of Authorization Model
一种具有时间约束的基于角色的授权管理模型
www.ilib.cn
4.
Implementation Scheme of Role-Based Access Control with Identity Code
应用特征码的角色访问控制实现方案
www.ilib.cn
5.
Role-Based Access Control for Muti-Domain Coalition Environments
多域结盟环境下基于角色的访问控制
ilib.cn
6.
Research on Role-Based Concurrence Control in Cooperative Design
基于角色的协同设计并发控制研究
www.ilib.cn
7.
Features Analysis and Comparison of Role-Based Delegation Models
几种基于角色的代理授权模型特征比较
www.ilib.cn
8.
Role-based permission system to define access to the viewing and editing of content
基于角色的权限系统,可以控制对内容的查看和编辑权限
www.ibm.com
9.
Role-based Access Control with Negative Authorization
具有负授权的角色访问控制
www.ilib.cn
10.
The Role-based Crossed Distributed Authorization Model in the E-government
电子政务中基于角色的交叉集散授权策略
www.ilib.cn
1.
A Role Based Software Collaboration Environment
基于角色的软件协作环境研究与实现
www.ilib.cn
2.
The Conception of Environment Role - based Grid Access Control Model
基于环境-角色网格访问控制构想
service.ilib.cn
3.
Research and Implementation of Role-Based Process Modeling
按角色过程建模的研究与实现
www.ilib.cn
4.
Research and Implementation of Role Based Access Control System
基于角色的细粒度访问控制系统的研究与实现
ilib.cn
5.
Role-based access control hierarchy model in distributed system
分布式环境下基于角色的访问控制层次模型
ilib.cn
6.
Role Based Access Control in Distributed Environment
分布式环境下基于角色的访问控制
www.ilib.cn
7.
A Role-Based Approach to Design Pattern Modeling and Implementation
基于角色的设计模式建模和实现方法
www.ilib.cn
8.
Role-Based Access Control of Collaborative Design Systems
协同设计系统中基于角色的访问控制
www.ilib.cn
9.
Role-Based Access Control Model with Enhanced Constraints
增强约束的角色访问控制模型
www.ilib.cn
10.
Analysis and Implementation of Role-Based Access Control Model
基于角色的访问控制模型分析与实现
www.ilib.cn
1.
Improvement and Application of Role Based Access Control Model
基于角色访问控制模型的改进及应用
www.ilib.cn
2.
Role- Based Access Control Model of Land Use and Planning Manage Information System
基于角色的土地利用规划管理信息系统访问控制模型设计与实现
ilib.cn
3.
Financial advisors: Role-based data protection
财务顾问:基于角色的数据保护
wenku.baidu.com
4.
Research and Application of Role-based Authorization System in MIS
基于角色的MIS系统授权机制的研究和应用
168.160.184.82:8080
5.
A Domain-based Administration Role Based Access Control Model
清软英泰基于域的授权管理模型
www.8wen.com
6.
Multi-layered role-based access control secure workflow model
基于角色的工作流多层访问控制安全模型
ilib.cn
7.
A Role-Based Access Control Model of OA and its Implement
基于角色的OA系统访问控制模型及其实现
www.ilib.cn
8.
Research on role-based lightweight access control system
基于角色的轻量级访问控制系统的研究
ilib.cn
9.
Research and Implementation of Role-Based Access Control
基于角色访问控制的研究与实现
ilib.cn
10.
Management About Usage Control Model by Role-Based Access Control
用基于角色访问控制实现使用控制模型的管理
www.ilib.cn
1.
A Research and Realization on General Role Based Access Control Model
一种通用的基于角色的管理控制模型的研究和实现
ilib.cn
2.
Analysis and Application of Role-based Access Control Models
基于角色的访问控制模型的分析与应用
ilib.cn
3.
Role-Based Modeling in Enterprise Dynamic Alliance
企业动态联盟中基于角色的建模
ilib.cn
4.
Role Based Computer Collaborative CAD System Model
一种基于角色的计算机协同CAD系统模型
ilib.cn
5.
Proxy Mechanism Oriented Role-based Access Control
面向代理机制的角色访问控制
www.ilib.cn
6.
Role-based access control in workflow management system
工作流管理系统中基于角色的访问控制
ilib.cn
7.
Three security principles for role-based access control
基于角色的访问控制中的安全三原则
www.ilib.cn
8.
Using Extended Fuzzy-Timing Petri Nets to Model Essentials of Role-Based CVE
扩展模糊时延Petri网下的协同虚拟环境要素建模
www.ilib.cn
9.
Realization and Research Role-Based Access Control with AOP
结合AOP基于角色访问控制的研究与实现
www.ilib.cn
10.
Role based access control model for database security proxy
数据库安全代理的基于角色访问控制模型
service.ilib.cn
1.
IBM Cognos BI features for implementing Role based security
用于实现基于角色的安全性的IBMCognosBI特性
www.ibm.com
2.
Role Based and Service Unit Based Network Architecture
基于角色和服务元的网络体系结构
www.ilib.cn
3.
Updating Role-Based Security for Report Builder Access
更新基于角色的安全性以访问报表生成器
msdn2.microsoft.com
4.
The Implementation of Role-based User Management Model
基于角色的用户管理模型及其实现
ilib.cn
5.
Theoretical Research on Role Based Access Control
基于角色的访问控制理论研究
service.ilib.cn
6.
Setting Role-Based Security Policy and Principals
设置基于角色的安全策略和主体
msdn2.microsoft.com
7.
Feature-Oriented and Role-Based Access Control for Web Services
面向特征的Web服务角色访问控制
www.ilib.cn
8.
Research of Role - Based Access Control Model in Data Backup System
数据备份系统中基于角色访问控制模型的研究
www.ilib.cn
9.
One doable management solution of role-based PMI authority
一个可行的基于角色的PMI授权管理方案
ilib.cn
10.
Role based facility for governance and access control
基于角色、用于用户治理和访问控制的设施
www.ibm.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/11/9 9:29:11