• 但是由于许多原因常常是不可行的比如工作负载限制安全性隐私规则或者大部分数据未知的。

    However, there are many reasons which may make this impossible such as workload limitations, security and privacy rules, or if the data is largely unknown.

    youdao

  • 我们预期供应商将会互相牵制,试图证明谁拥有更强壮安全性隐私策略因为他们知道这些因素游戏规则破坏者

    We can also expect that vendors will trip over each other trying to prove which one has the stronger security and privacy policies, because they know those factors are game-breakers.

    youdao

  • 这个策略范围包括了隐私策略规则安全性策略和规则交易实施规则

    The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.

    youdao

  • RuleExecutionServer具备处理管理性能安全性业务规则执行相关日志功能

    Rule execution Server handles the management, performance, security, and logging capabilities associated with the execution of business rules.

    youdao

  • WebSphereApplicationServer安全性组件提供身份验证HumanTaskManager使用工作来提供基于实例规则授权

    Authentication is provided by the WebSphere Application Server security component, and the instance - and rule-based authorization is provided by Human Task Manager using work items.

    youdao

  • 架构需要涉及许多问题安全性访问控制服务水平协议,直到业务工作流事件处理信息管理业务规则

    The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.

    youdao

  • 这些领域包括启用远程服务规则IP安全性过滤启动文件,包括inittabrc.tcpip inetd细粒度控制

    These areas included rules for enabling remote services, IP security filtering, and more granular control for startup files, which included inittab, rc.tcpip, and inetd.

    youdao

  • 通过实施点登录功能用户只需一次登录就可以根据相关规则访问不同应用系统提高信息系统安全性稳定性

    With the single sign-on function, users could access different application systems based on relevant rules via once login which enhances system's security and stability.

    youdao

  • 为了加快工作票生成速度保证操作过程安全性提出一种基于规则的工作票描述语言自动生成算法

    To speed up the generating procedure of work order and guarantee the operation safety, a rule-based algorithm for the automatic generation of work order description language is presented.

    youdao

  • 如果使用早期代码访问安全性规则(级别1)的程序完全受信任,则可以调用级别2安全关键类型成员

    Assemblies that use earlier code access security rules (level 1) can call level 2 security-critical types and members if they are full trusted.

    youdao

  • 通过引入多实例伪元组,并重新定义读写规则,使改进模型更具安全性、灵活性可用性。

    In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving...

    youdao

  • 通过引入多实例伪元组,并重新定义读写规则,使改进模型更具安全性、灵活性可用性。

    In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving...

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定