您要查找的是不是:
- A dynamic workflow authorization model is proposed,which describes the triggers and constraints of tasks by expression. 提出了一种动态的工作流授权模型,通过表达式描述任务的触发机制和约束。
- In this final leg of the tour, you ll learn about a discrepancy in the JAAS authorization model and I ll describe a practical method for addressing it. 在本导游的最后一程,将介绍JAAS认证模型中的一个矛盾,并且我将描述一个解决它的实际方法。
- Security is another major area of change with the transition from the WebSphere security authorization model to role-based security. 安全性是更改的另一个主要方面,它体现在从WebSphere安全性授权模型到基于角色安全性的转变中。
- The code-centric authorization model of the Java 2 platform security architecture was based on the assumption that the user had to be protected from the world. Java 2平台安全体系结构的以代码为中心的授权基于这样的假设,即必须保护用户不受外界影响。
- In the Windows authorization model, permissions are granted through an access control interaction that compares the access token to the access control lists (ACL). 在Windows授权模型中,权限授予方式是将访问令牌与访问控制列表(ACL)进行对比的访问控制交互。
- With the help of the authorization concepts of OODM, this paper proposes the deducing implicit authorization model and introduces its implementation in application domain. 借助于面向对象的数据模型 (OODM)中的授权概念,提出了在关系型数据库模型下的隐式授权推导模型,并介绍了这种模型的具体实现与应用。
- And a WFMS authorization model based on role control and time constraints is constructed, and how it meets the desires of least privilege and separation of duty is discussed. 构建了一个带有时间约束的塞于角色的工作流系统授权模型,分析该模型对最小权限和责任分离要求的满足情况。
- And a WFMS authorization model based on role control and time constraints is constructed,and how it meets the desires of least privilege and separation of duty is discussed. 构建了一个带有时间约束的基于角色的工作流系统授权模型,分析该模型对最小权限和责任分离要求的满足情况。
- Some existing authorization schemes in VoIP systems are too complex and inconvenient to be used to handily manage the systems, so it needs a new session and media authorization model in IP Video Phone Systems. 在IP电话系统中也有一些专有授权方案,但是这些针对IP电话的授权方案存在着授权过程复杂,消息交换繁琐,以及需要过多预信任关系的缺点,因此需要一种新的会话和媒体授权方案。
- Thirdly, it specifically explains existing information security model of WFMS, including workflow reference model, identity authentification model, access control model and authorization model. 然后详细的解释说明了当前已有的工作流管理系统的信息安全模型,包括工作流管理系统参考模型,身份认证模型,访问控制模型和授权模型。
- Authorization Model on Application Enclave Boundary 应用区域边界授权模型
- usage control authorization model 使用控制授权模型
- The authors' model helps us to understand diverse phenomena in negotiation and ultimately illuminates the complex dynamics of what it means to negotiate relationally. 作者提出的模型有助于我们理解谈判中的不同现象,并从根本上解释了造成关联化谈判的复杂动力。
- The authors model the firm's decision as a binary logit model with random parameters for the contract-level variables and fixed parameters for the firm-level variables. 公司的决策即是一个双对数模型,合同层面变量作为随机参数,公司层面变量作为固定参数。
- The heroine is the spitting image of the author. 书中女主人翁是作者的真实写照。
- As to the author of the book, I will hazard a guess. 关於这本书的作者,我来试猜一下。
- Standing by him was a model worker. 站在他旁的是一位劳动模范。
- The author dedicated her new book to her supportive family. 这位作家将她的新书献给支持她的家庭。
- The author is going to adapt his play for television. 作者将把他的剧本改编成电视剧。
- The author's fingerprint is quite obvious in all of his works. 作者的特色在他所有的作品中都很明显。