• Provide data governance capabilities to enforce and audit both transaction and data access security.

    提供数据治理功能实现审计事务数据访问安全

    youdao

  • To access these data stores, you need to create and appropriately configure security realms.

    访问这些数据存储需要创建适当地配置安全领域

    youdao

  • One safeguard that can be placed on any security model is graduated data access.

    应用任何安全模型一种防护措施分级数据访问。

    youdao

  • The core concept is to centralize all security decisions in the gateway and prevent unwanted data access.

    核心思路所有安全决策集中网关防止不希望出现数据访问。

    youdao

  • This has not always been an easy job, especially when data and access security was at stake.

    不是件简单的事情尤其是数据访问安全处于危险境地时。

    youdao

  • In particular, it examined access to enterprise data, privacy and security concerns, and some lightweight development tools.

    特别是其中研究了企业数据访问隐私安全顾虑以及某些轻量级开发工具。

    youdao

  • If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.

    如果用户拥有特定安全策略特定规则豁免权那么用户试图访问受该安全策略保护数据时,该规则将不起作用。

    youdao

  • Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.

    小心请不要生产环境中使用过程允许未经授权的用户访问用户数据这样做可能会违反公司隐私安全政策

    youdao

  • Writing the security code that defines who can access and use the data.

    编写安全代码,它将定义有权访问使用数据的人员。

    youdao

  • The provision to access persistent data as resources by a remote client raises data privacy and security concerns.

    一个远程客户端提供持久化数据访问可能会引起数据保密安全问题。

    youdao

  • Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.

    当然不是所有应用程序都会访问关键数据这些程序开发人员确实能够通过加入访问控制增强应用程序的安全

    youdao

  • Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.

    描述位置系统访问方法数据流通更新频率、数据安全性和数据质量

    youdao

  • When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.

    另一个用户需要访问文件时,在授予数据访问权限之前,将验证安全凭据使这些文件数据已经明文格式存在内存中。

    youdao

  • Explore enterprise changes required to build such an environment and the challenges you must address while building it, including access to enterprise data, and privacy and security concerns.

    探索构建此类环境所需企业改变构建必须解决问题其中包括企业数据访问以及隐私安全问题

    youdao

  • This same security requirement applies to REST access to a data grid.

    这个相同安全需求适用数据网格的REST访问

    youdao

  • Companies and policy makers must also tackle misaligned incentives around issues such as privacy and security, access to data, and technology deployment.

    企业政策制定者必须克服这些关于隐私安全数据访问技术部署问题的不对称诱因

    youdao

  • Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.

    通过适当认证访问控制确保只有具有适当身份经过授权用户可以访问数据,可以处理大多数数据安全问题

    youdao

  • When data grid security is enabled, only authorized users can access data in the data grid.

    数据网格安全启用时,只有经过授权用户才能访问数据网格中的数据。

    youdao

  • The database security administrator allows users access to protected data by granting them security labels.

    数据库安全管理员通过用户授予安全标签来允许他们访问受保护数据

    youdao

  • When a user tries to access protected data, his security label is compared to the security label that is protecting the data.

    一个用户试图访问保护的数据时,必须将安全标签保护数据的安全标签进行比较。

    youdao

  • The security administrator allows users access to protected data by granting them security labels.

    安全管理员通过用户授予安全标签允许用户访问受保护数据

    youdao

  • IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.

    IDSLBACREADSET:要访问数据用户安全标签每个集合组件必须包括数据安全标签的集合组件。

    youdao

  • An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing.

    豁免权使用户可以访问安全标签允许访问受保护数据

    youdao

  • Each user should have access to a security level based upon the level of data sensitivity he or she can see.

    根据用户可以看到数据敏感性级别每个用户都应该可以访问某个安全级别。

    youdao

  • The data to be processed is typically not confidential or sensitive, therefore there are minimal security requirements; and transactional data access is atypical.

    处理数据通常并不是机密数据或者敏感数据,因此存在最小限度安全需求并且通常不需要进行事务性的数据访问。

    youdao

  • Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    安全策略定义安全标签组成指定控制敏感数据访问规则

    youdao

  • When a user tries to access protected data, that user's security label is compared to the security label protecting the data.

    一个用户试图访问保护的数据时,用户安全标签将与用于保护数据安全标签相比较

    youdao

  • When a user tries to access labeled data, his LBAC credentials are compared to security label protecting data to see if access is allowed.

    一个用户试图访问标签数据时,要将LBAC凭证保护数据的安全标签进行比较,确定是否允许访问。

    youdao

  • Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.

    通过增强访问控制身份标识认证提高UDDI数据完整性从而使安全性问题得以解决。

    youdao

  • IDSLBACREADARRAY: Each array component of the user security label must be greater than or equal to the array component of the data security label to allow access to data.

    IDSLBACREADARRAY:要访问数据用户安全标签每个数组组件必须大于等于数据安全标签的数组组件。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定