Aim at the characters of spatial data access control, the concept of spatial region access control based on spatial index was proposed.
针对空间数据的访问控制的特点,提出了基于空间索引的区域访问控制概念。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
The issue here is that existing applications effectively control enterprise data access through implementation of the data access and validation logic.
这儿的问题是现有应用通过实现数据存取和验证逻辑有效控制了企业数据的访问。
Provide functional and data entitlement by maintaining access control lists of users.
通过维护用户的访问控制列表来提供功能和数据权限。
Using this feature, data stewards can control read and write access for users and groups at the table column and row level.
借助这个特性,数据管理员可以在表的列和行级别控制用户和组的读写访问。
Access control ensures that only people with correct rights can access data and content.
访问控制确保只有拥有正确权限的用户才能访问数据和内容。
As mentioned previously, the EJB components control the access to the back-end data and manage the current transactions and database locking internally.
正如前面提到的那样,EJB组件控制着对后台数据的访问,并管理着当前事务和数据库的内部锁定。
As a best practice, consider using stored procedures as a way to control access to your data.
作为一项最佳实践,应考虑使用存储过程来控制对数据的访问。
Locking is the mechanism that the database manager USES to control concurrent access to data in the database by multiple applications.
锁定是数据库管理器用来控制多个应用程序并发访问数据库中数据的机制。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
A utilization service support tenants to maintain and configure their specific organization structure and access control data.
利用服务支持租户维护和配置自己的组织结构和访问控制数据。
The movie and recording industry, online music stores, and electronic book publishers all use their own specific DRM technology to control access to their data.
电影以及唱片行业、在线音乐商店以及电子书籍出版商都会使用其特定的DRM技术来控制对其数据的访问。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
As a best practice, consider using LBAC as a way to control access to sensitive data.
作为一项最佳实践,应考虑使用LBAC作为控制对敏感数据的访问的一种方法。
The system should provide mechanisms to authenticate users with user data residing in the on-premise environment, and authorize with access control data residing in an on-demand environment.
系统应该提供相应的机制,以便使用自行管理环境中的用户数据对用户进行身份验证,并使用按需环境中的访问控制数据进行授权。
Sitting on top of the data storage, JCR offers content services like granular access control, versioning, content events, full-text search and filtering among others.
在数据存储之上,JCR提供诸如访问粒度控制、版本控制、内容事件、全文检索和过滤等内容服务。
The EJB components control the access to the back-end data and manage the current transactions and database locking internally.
EJB组件控制着对后台数据的访问,并管理着当前事务以及数据库的内部锁定。
An online policy is used for encrypting data written to a file system and protecting data with access control.
在线策略,用于加密写到文件系统的数据,以及通过访问控制保护数据。
They control access to the back-end data and internally manage current transactions and database locking while preserving data integrity.
在保持数据完整性的同时,它们控制对后端数据的访问并在内部对当前事务和数据库锁定进行管理。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.
随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
Use stored procedures to control data access.
使用存储过程来控制数据访问。
Use views to control data access.
使用视图来控制数据访问。
Realm Write operations: Currently all Realm implementations support 'read' operations for acquiring authentication and authorization data to perform logins and access control.
Realm写操作:目前所有Realm实现都支持“读”操作来获取验证和授权数据以执行登录和访问控制。
The customization mechanism to support tenant-specific UI, access control, process and data model via configuration approaches.
通过配置方法支持与租户相关的UI、访问控制、过程和数据模型。
A secfsd process holds online policies, and encrypts and decrypts data with access control.
secfsd保存在线策略,以及与访问控制有关的加密和解密数据。
Give control to the data access API.
通过数据访问API进行控制。
Give control to the data access API.
通过数据访问API进行控制。
应用推荐