授权过程

  • 网络Authorization process
授权过程授权过程
  1. Acegi再次执行对访问bean的授权过程。

    Acegi again executes its authorization process to access the beans .

  2. 如果授权过程成功,则将控制权转移给JSF,由JSF准备提供JSF页面。

    If the authorization process succeeds , control is transferred to JSF , which prepares to serve the JSF page .

  3. 请使用常规的J2EE授权过程授予对实现为EJB的Web服务的访问权。

    Use your normal J2EE authorization procedures to authorize access to Web services implemented as EJBs .

  4. ExceptionTranslationFilter(ETF)处理身份验证和授权过程中的异常情况,比如授权失败。

    The Exception Translation Filter ( ETF ) handles exceptional cases in the authentication and authorization procedure , such as when authorization fails .

  5. 但编程方式的安全增强则更有意思一些,login、logout这些方法能让开发人员更好地控制认证和授权过程。

    But the more interesting thing is the programmatic security enhancements including the login and logout methods which give the developer more control over the authentication and authorization process .

  6. 协议采用双因素认证方式,能够实现TPM、U-KEY和用户U之间的相互认证,能够将认证和授权过程严格分开,严格区分不同用户的权限。

    This protocol is double-factor authentication , can achieve the authentication among TPM , U-KEY and user , and can separate authentication and warrant strictly .

  7. 在演进分组网络中,三大问题阻碍了QoS在该网络的发展:QoS协商与授权过程繁杂、QoS实施过程效率低、设备资源开销大和策略与计费控制架构不统一。

    In EPS , there are 3 problems which have hindered its development in QoS : A complex QoS negotiation and authorization process , inefficient QoS implementation process and high consuming in devices resources , and dual Policy and Charging Control ( PCC ) structures .

  8. accessDecisionManager组件管理授权过程,这部分内容将在本系列的下篇文章中详细讨论。

    The accessDecisionManager component manages the process of authorization , which the next article of this series will discuss in more detail .

  9. 重点研究了委托授权过程中的安全约束,并提出了一个基于约束的委托授权模型(CDAM)。

    Security constraints in the process of delegation authority is researched mainly and a constraint-based delegation authorization model ( CDAM ) is proposed .

  10. 但批准授权过程一直被美国方面搁置。

    That approval has been stalled in the U.S. government .

  11. 用户在申请普适服务时进行的认证授权过程,存在着身份暴露问题。

    Users suffer from identity exposure when commit authorization with a pervasive service .

  12. 多租户权限数据模型设计和授权过程

    Multi-tenant permission data model design and authorization process

  13. 利用我们编写的客户端应用接口,用户可以完成上述认证与授权过程。

    The user can accomplish the authentication and authorization through the client application program interface .

  14. 在授权过程中,利用数据驱动技术来进行其权限设置。

    In the course of authorization , make use of technique of data driven to set right .

  15. 现有的群签名方案均假设群成员具有相同的权限,首次提出分级群签名概念,并通过在一般的群签名中加入一个授权过程实现了分级群签名。

    The notion of rank group signature is proposed for the first time , and a concrete scheme is given as well .

  16. 您将很快看到,授权过程还将授权我的应用程序代表用户来操作。

    The authentication process will also authorize my application to act on the user 's behalf , as you 'll soon see .

  17. 它实施一个授权过程。在调用控制器级事务之后,这可能限制终端用户可查看的记录数量。

    It enforces an authorization process that may limit the end user on the amount of records it can view after the controller level transaction is called .

  18. 但在授权过程当中如何能使授权各方都能达到自己的最大利润,也就是如何去寻找一个均衡。

    But how to maximize the payoff of each side , or say , how to find an equilibrium in the licensing process is a standard principle-agent problem .

  19. 信息保护代理既能阻止企业用户在未通过批准前将涉及机密的信息发送到外部,还能审计全部信息授权过程。

    The information protection proxy can prevent enterprise users from sending confidential involved messages to outside without approval , and at the same time audit the whole information authorization process .

  20. 这里的授权过程基于端到端模式,并且代理的开销非常小,同样可应用于移动互联网环境。

    The authorization procedure is based on peer to peer mode and the proxy overhead is very low , and can also be used in mobile internet applications . 3 .

  21. 如早先讨论的一样,一个隐含的授权过程伴随着敏捷开发团队,授权开发人员做出基于客户优先级的变更,或者在必要时重构。

    As discussed earlier , there is an implicit authorization process with agile development teams ; developers are authorized to make changes based on customer priority or refactoring as necessary .

  22. 由于传统的访问控制模型仅仅关注于授权过程,用户一经授权便可不受限制的使用资源,对资源的使用过程缺乏灵活性、动态性和细粒度的有效控制,不利于对资源的安全保护。

    As traditional access control model only pays attention to authorization step , the user can unlimited use the resource when he is authorized , that lacks agility , dynamic and granule control , go against to protect resource .

  23. 第一步的当中一个在实施的TPM形成被授权改进过程的队。

    One of the first steps in implementing TPM is forming teams that are empowered to improve the process .

  24. 授权的过程涉及到验证经过确认的用户拥有正确的权限,每个权限都包含一个相对URI和动作。

    Authorization involves verifying that the identified consumer has the appropriate privilege . A privilege is comprised of a relative URI and an action .

  25. 该模型以可信计算基础设施(TrustedComputingInfrastructure,TCI)作为底层支持,在授权访问过程中把信任从TCI传递到信任关系,最后到网络活动。

    This model , which is base on trusted computing infrastructure , transfers trust from trusted computing infrastructure to trust relationship , and finally to network activity .

  26. 拦截过滤器可以在授权的过程中使用authenticationManager重新对客户机进行身份验证。

    The interceptor filter can use the authenticationManager to re-authenticate a client during the authorization process .

  27. 对于授权播放过程,则通过网络将敏感数据和解密密钥传输给NVD播放机,NVD播放机解密光盘数据,并与敏感数据整合,以获得理想的播放效果。

    For the authentication play process , the sensitive data and key for decryption would be transported from server end to a NVD player , and then the NVD player could decrypt the ciphertext in discs , combine them with the sensitive data and play with full satisfaction of customers .

  28. 浅议授权领导过程

    On Process of the Leadership by Authorization

  29. 授权领导过程是领导者授权几个有机环节构成的连续工作。

    The process of the leadership by authorization is made up of several phases of leadership that have organic and continuous links .

  30. 雇员被授权影响过程典型地将是辨认和创造由管理通常会忽略的步骤改进。

    Employees empowered to affect the process will typically be in a position to identify and create process improvements that would have normally been overlooked by management .