但是,由于许多原因,这常常是不可行的,比如工作负载限制、安全性和隐私规则,或者大部分数据是未知的。
However, there are many reasons which may make this impossible such as workload limitations, security and privacy rules, or if the data is largely unknown.
我们也应预期供应商将会互相牵制,试图证明谁拥有更强壮的安全性和隐私策略,因为他们知道这些因素是游戏规则的破坏者。
We can also expect that vendors will trip over each other trying to prove which one has the stronger security and privacy policies, because they know those factors are game-breakers.
这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.
RuleExecutionServer具备处理管理、性能、安全性和与业务规则执行相关的日志功能。
Rule execution Server handles the management, performance, security, and logging capabilities associated with the execution of business rules.
WebSphereApplicationServer安全性组件提供身份验证,HumanTaskManager使用工作项来提供基于实例和规则的授权。
Authentication is provided by the WebSphere Application Server security component, and the instance - and rule-based authorization is provided by Human Task Manager using work items.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
这些领域包括启用远程服务的规则、IP安全性过滤和对启动文件,包括inittab、rc.tcpip 和inetd 的更细粒度的控制。
These areas included rules for enabling remote services, IP security filtering, and more granular control for startup files, which included inittab, rc.tcpip, and inetd.
通过实施单点登录功能,用户只需一次登录就可以根据相关的规则去访问不同的应用系统,提高信息系统的安全性和稳定性。
With the single sign-on function, users could access different application systems based on relevant rules via once login which enhances system's security and stability.
为了加快工作票的生成速度和保证操作过程的安全性,提出了一种基于规则的工作票描述语言自动生成算法。
To speed up the generating procedure of work order and guarantee the operation safety, a rule-based algorithm for the automatic generation of work order description language is presented.
如果使用早期代码访问安全性规则(级别1)的程序集完全受信任,则可以调用级别2安全关键类型和成员。
Assemblies that use earlier code access security rules (level 1) can call level 2 security-critical types and members if they are full trusted.
通过引入多实例和伪元组,并重新定义读写规则,使改进后的模型更具安全性、灵活性和可用性。
In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving...
通过引入多实例和伪元组,并重新定义读写规则,使改进后的模型更具安全性、灵活性和可用性。
In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving...
应用推荐