本文对细粒度XML文档上的BIBA严格完整性策略进行了研究。
The paper focuses on the BIBA strict integrity policy of the fine-grained XML documents.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
但是确实有的时候这个策略可以帮助您维持最快速的处理时间,同时支持某种程度的数据完整性和一致性。
But there are certainly times when this strategy will allow you to maintain the fastest possible processing time and still support some degree of data integrity and consistency.
同样,缺乏有效的(或任何)事务策略将对您数据的完整性和一致性造成负面影响。
Likewise, the lack of an effective (or any) transaction strategy will have a negative effect on your data's integrity and consistency.
在讨论云时,有许多特性应该加以讨论,其中包括:多租户、安全性、数据完整性验证、恢复期望值以及退出策略。
When discussing the cloud, there are many characteristics that should be discussed, including: multi-tenancy, security, data integrity verification, retrieval expectations, and exit strategies.
这将导致许多问题,如数据完整性、锁定策略以及数据库人员所熟知的一些问题。
That leads to many issues of data integrity, locking strategies, issues that are well known to database people.
因此,在您有能力运行负载测试来确定是否有数据完整性、死锁或性能问题之前,请保留缺省访问目的策略不变。
Therefore, leave the default access intent policies until you are able to run the load test to determine whether or not there are data integrity, deadlock, or performance problems.
对于第二个策略(每个类层次结构一个表),您必须用检测约束定义您自己的完整性。
For our second strategy (one table per class hierarchy), you'll have to define your integrity using check constraints.
不能改变已部署的策略,而且都使用了数字签以允许任何服务检查它的可靠性和完整性。
Deployed policies cannot change and are digitally signed to allow any service to check its authenticity and completeness.
对于获得最佳的应用程序性能,以及确保数据完整性和一致的应用程序行为来说,数据库锁定策略是非常重要的。
Database locking strategies are critical for gaining the best possible application performance, while ensuring data integrity and consistent application behavior.
对命令进行逐一审计的组织策略有助于增强系统的完整性、可靠性和业务连续性。
The awareness of an organizations policy of command-by-command auditing will help to reinforce a mentality of system integrity, reliability, and business continuity.
此策略集通过数字签名来保护消息的完整性,并通过加密来保护消息的机密性。
This policy set provides message integrity through digital signature and message confidentiality through encryption.
IBMAIXV6.1提供了某些可配置用于运行时完整性检查的策略。
There are certain policies provided by IBM AIX V6.1 that can be configured for run-time integrity checking.
缺省的WS - Security策略通过对消息正文和标题进行数字签名来保护消息的完整性,并通过加密正文确保消息的机密性。
The default WS-Security policy secures the message integrity via a digital signature for the body and headers, ensuring message confidentiality via encryption of the body.
数据完整性——表示数据保存策略和其他的数据生命周期责任。
Data integrity a "represents data retention policies and other data lifecycles responsibilities."
尽管WebServicesSecurity (WS - Security)策略集可以在使用附件时应用,隐私或完整性设置却不会应用到附件数据。
Though a Web Services Security (WS-Security) policy set can be applied when using attachments, privacy or integrity Settings will not apply to the attachment data.
对于WebServices绑定,我们有认证、完整性和机密性策略。
LR: For the Web Services bindings, we have enabled authentication, integrity and confidentiality policies.
当 binaries/libraries/scripts和内核扩展的完整性检查已失败时,这些策略将决定其命运。
These policies decide the fate of the binaries/libraries/scripts and kernel extensions for which the integrity check has failed.
通过配置安全策略来执行运行时完整性检查。
不变策略版本及检查策略数据完整性的能力支持分布及响应环境的优化。
Immutable policy versions and the ability to check policy data completeness supports optimization for distributed and responsive environments.
“差异的设置”与“差异的还原”构成了诗的功能机制上的完整性,这是现代诗所独有的语言策略。
Difference making and presenting forms the wholeness of poetry at the function level, all of which are distinctive linguistic tactics of modern poetry.
此外,合理的定义和应用一项数据完整性的检验策略,可以更有效地提高数据存储和检索的效率。
Besides, reasonably defining and utilizing the strategy of checking the integrality of data can increase the efficiency of data storage and search more effectively.
为适应主题的动态性和完整性,本文提出了一种基于网络日志分析的混合策略主题爬虫。
This article provides a mixed strategy topic crawler which is based on network log analysis in order to adapt the dynamics and integrality of topic.
数据完整性和合法存取会受到很多方面的安全威胁,包括密码策略、系统后门、数据库操作以及本身的安全方案。
Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.
结果通过测试和论证这些策略能够保证综合化航空电子系统的数据安全性和完整性。
Results By testing, it is known that these straggles can ensure the data security and integrity in integrated modular avionics system.
基于此,研究了如何维持在策略空间穿越中的安全信息的完整性与有效性,提出了基于安全信息的动态访问控制算法。
How to maintain integrity and validity of security information is studied through policy space and a dynamic access control algorithm based on security information is presented.
该系统能够根据用户制定的文件保护策略检查文件系统中违反策略的行为,采取相应的保护措施进行文件的实时恢复,进而维护文件系统的完整性。
It can check the violation of policy in file system according to file integrity policies specified by users, take actions to recover files in real time and, thus, maintain file system integrity.
此外,合理地定义和应用一项数据完整性的检验策略,可以更有效地提高数据存储和检索的效率。
The efficiency of data storage and search is improved by defining and deploying policy to verify data reasonably.
在测试对象选择策略上,ERT通过使用高斯随机和正态分布,比较真实的模拟了用户的随机操作并实现了测试覆盖的完整性。
In the field of strategy in choosing test object, Gauss random and normal distributions are used in ERT to simulate the random operations and cover the test fully.
此策略运用了模糊规则和模糊推理机制,能很好地适应交易信息的不完整性和不确定性。
This strategy is based on fuzzy rules and fuzzy reason mechanisms in order to be suitable for the environment of the incomplete and uncertain trade information of e-commerce.
应用推荐