| 1. | A discrepancy in the authorization model 授权模型的矛盾 |
| 2. | V4 conforms to the j2ee 1 . 2 authorization model , which is based on security roles rather than method groups V4符合j2ee 1 . 2基于安全性角色而不是方法组的授权模型。 |
| 3. | Together , the java 2 platform security architecture and jaas comprise the current java authorization model Java 2平台安全体系结构和jaas共同构成了当前的java授权模型。 |
| 4. | Like other components of the sql server authorization model , principals can be arranged in a hierarchy 与sql server授权模型的其他组件一样,主体也可以按层次结构排列。 |
| 5. | Abstract : based on the authentication model for user , the multilayer - authentication model of authentication manager was advocated 摘要在以用户为中心的授权模型的基础上,提出了授权管理器的授权层次模型。 |
| 6. | Through role - based security , reporting services provides an authorization model , but it does not include an authentication component 通过基于角色的安全性, reporting services提供了一种授权模型,但它并不包含身份验证组件。 |
| 7. | Security is another major area of change with the transition from the websphere security authorization model to role - based security 安全性是更改的另一个主要方面,它体现在从websphere安全性授权模型到基于角色安全性的转变中。 |
| 8. | In the sections that follow , i ll focus on the user - centric authorization model of the java authentication and authorization service 在下面一节中,我将重点介绍java认证和授权服务( java authentication and authorization service )的以用户为中心的授权模型。 |
| 9. | I ve documented a discrepancy in the jaas authorization model and also described a practical workaround , offering a real - world implementation as its example 我介绍了jaas授权模型中的一个矛盾之处,并描述了一种解决它的实用方法,并提供了它的现实世界实现的一个例子。 |
| 10. | Aiming the applications of pki at peer - to - peer networks ( p2p ) , we provide an elegant composite model for trust and authorization to solve trust management problem efficiently 本文针对p2p网络应用环境,提出了“复合模式”的信任授权模型,有效的解决了信任管理这一问题。 |