访问权限
- 与 访问权限 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Third-Party Logistic of Warehouse Management System Framework provides a series of reusable groupware, such as persistence layer which introduces Dynamic Value Object, Value List Hander and Command pattern. It encapsulates the details of accessing database and affords the interface of different persistence layer framework. Based on Asynchronous JavaScript and XML, we develops the client validity check engine, dynamic cascading menu and common, dynamic tree structure groupware, as well as a set of tag library which include query, pagination, cache and so on. It reduces the code redundancy and predigests the development of interface layer enormously.
第三方物流管理系统框架提供了一系列可复用组件,例如采用动态VO、值列表处理器以及命令模式的持久层组件,封装了数据库访问细节,并为不同的持久层框架提供调用接口;基于Ajax(Asynchronous JavaScript and XML)技术的客户端校验引擎、动态级联菜单以及通用动态树型结构组件,一系列查询、分页、缓存等标签库则减少了表示层的代码冗余,简化了表示层开发;基于SSL登录以及基于角色的访问控制的安全子系统则初步实现了数据安全传输和权限控制;此外基于Web服务的企业应用集成模型为今后系统集成、数据共享提供了有益探索。
-
The author constructs LREO by Protg,by establishing metadata namespace,defining relations among LREO elements,showing ontology view of LREO and giving access methods.The author constructs LRSDG with the help of Grid platform GT4,which implements system's monitoring and management,data synchronization testing and data analyses of user access.The author also constructs LRSS using Sakai,which provides user authentication,distribution of competencies,interactive collaboration and co-evolution in the ecosystem.
g开源本体工具建构了学习资源生态本体,包括建立元数据命名空间,定义LREO元素和元素间关系,呈现LREO本体视图,并给出了本体语义访问方法等;利用网格平台GT4实现学习资源自治管理环境LRSDG,包括LRSDG的系统监控管理、同步数据性能测试和用户访问情况数据分析;用开源Sakai系统建立了学习资源的服务共享环境,实现了学习资源服务共享环境中的用户认证、权限分配以及协作交互与协同演化等功能。
-
The static model describes the relationship among user, permission and role and imports integrated inheritance to actualize the relationship between local role and global role. The dynamic model completes access control by session diffluence based on the static model. The actualization for the model is researched based on the analysis of the content and the rule of the model. A self-adapted RBAC wrapper based on agent model is presented according to the heterogeneous databases'demand for wrapper.
该模型比较全面地解决异构数据库系统的局部数据对象和全局数据对象的综合访问控制。I-RBAC模型包括静态模型和动态模型两个部分,静态模型主要描述用户、权限、角色(特别是全局角色与局部角色)之间的关系,动态模型是在静态模型中角色层次关系的基础上通过会话分流实现动态的访问控制。
-
You need x to use a directory in a pathname.
对于目录来读,x不叫可执行了,它叫可访问,没有x权限,你不能cd进去,就算你有该目录的写权限,你也不能在里面创建文件或删除文件。
-
And then a struct model of security storage system and relative security mechanism is designed, in witch a grade-accessing control sheme and a data-encrypted key distributing arithmetic based on common module general linear congruent equation class are designed to realize that storage data is accessed safely and shared by grade.
在此基础上,详细给出了iSCSI-SAN存储系统安全机制的设计方案,重点设计了基于权限证书的访问控制机制和基于共模p的线性同余方程组的数据加密密钥分配算法,实现了存储数据的安全访问与分级共享。
-
Secondly, it used the hierarchic role and separation of duty constraint to solve the overlapping problem of roles.
该模型通过用户—角色—权限的权限授权模式,减少了授权管理的复杂性;通过角色等级和职责分离约束解决了用户角色职能交叉重叠的问题;引入团队和个性化数据集的概念,改善了系统的数据的访问隔离问题并完善了用户个性化;最后介绍系统实现实例。
-
Possible uses for this feature include: purchasing access to larger images, purchasing access to albums and allowing future discounts for returning customers - depending on what permissions are preassigned to the group to which the purchaser is to be added.
该特点的可能存在的用处包括:购买较大图片的访问权,购买相册访问权并允许回头客在将来享受折扣—取决于该购买者被添加到的用户组预先指派的权限。
-
The supporting technologies of network information security are summarized. The unitive authentication systems existing are analyzed in this paper; their virtues and shortcomings are discussed.2. About the distributed peculiarities of allied resource, the concept of alliance grid is established. The access control model of alliance grid is established by directive ideas of access control security of alliance grid. AG-RBAC model is set up in the basic of common RBAC, interbedded relations between roles are set forth.
针对制造联盟企业资源分布式的特点,提出了联盟网格的概念;根据联盟网格安全访问控制的指导思想,提出了联盟网格访问控制模型;在一般RBAC模型的基础上提出了基于角色的联盟网格访问控制模型,清晰的表述了角色之间的层次关系;初步分析了AG-RBAC的实现模式,重点讨论了角色定义和权限配置的实现方法。
-
In previous versions of Windows, when an application requires the ability to writee to access a location (such as system directories or protected Registry keys), unless the user explicitly has write access to that file or has administrative rights, the application may fail.
在Windows的早期版本中当应用程序需要能够写访问的位置(如系统目录或受保护的注册表项),除非用户明确具有写访问该文件,或有管理权限,应用程序可能会失败。
-
Introducing the idea of fuzzy logic, this paper advances Trust-authorization-based fuzzy access control model and exerts fuzzy synthetic judgment method to calculate subjects' trust worthiness, establishes fuzzy control rules, automatically authorizes subjects' relevant privilege by fuzzy adjudging, which can satisfy requirements of open information system access control.
文中引入模糊逻辑的思想,提出了基于信任授权的模糊访问控制模型,运用模糊综合评判法计算出主体在开放式信息系统中的信任度,并建立模糊控制规则,通过模糊判决自动授予主体相应的权限,使其能够更好的满足开放式信息系统中访问控制的要求。
- 推荐网络例句
-
They weren't aggressive, but I yelled and threw a rock in their direction to get them off the trail and away from me, just in case.
他们没有侵略性,但我大喊,并在他们的方向扔石头让他们过的线索,远离我,以防万一。
-
In slot 2 in your bag put wrapping paper, quantity does not matter in this case.
在你的书包里槽2把包装纸、数量无关紧要。
-
Store this product in a sealed, lightproof, dry and cool place.
密封,遮光,置阴凉干燥处。