• You need to select the same database when you import your security model, as shown in Figure 15.

    需要导入安全模型选择相同数据库如图15所示。

    youdao

  • Before you import the file containing your security model, import the file containing your cube model into the InfoSphere Warehouse control database using the Administration Console.

    导入包含安全模型文件之前使用Administration Console将包含多维数据集模型的文件导入InfoSphereWarehouse控制数据库

    youdao

  • The lack of a database-level security model makes it difficult to fully leverage ZEO storage servers as clients have more or less unfettered access to the database and must therefore be trusted.

    缺乏数据库级别安全模型使得充分利用ZEO存储服务器变得非常困难因为客户拥有数据库自由访问因此客户端必须信任

    youdao

  • Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.

    数据完整性信息系统安全目标之一该文描述了一个时间相关数据库管理系统完整性策略模型

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • The integrated model can simplify administration of privileges, and is appropriate for multilevel relation database system which has many users or complex security levels.

    模型方便了管理员权限管理,适合用户较多,安全层次比较复杂多级关系数据库系统

    youdao

  • In recent years, security model for database has been a focus in the research field of database.

    近年来,数据库安全模型一直是数据库方面研究热点

    youdao

  • The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.

    安全数据库管理系统安全策略可以数据库提供强大的安全功能,现在BLP模型用得比较普遍的策略模型之一

    youdao

  • According to various technologies to ensure database security, we introduce an ideal anti-threat model.

    结合当前保证数据库安全各种技术提出了一个理想对抗模型

    youdao

  • The features of multilevel security of database, such as its integrity, security and serviceability, are analysed both in depth and in width by way of a multilevel security model illustration.

    介绍了多级安全数据库完整性保密性,展示了多级模型深度广度探讨了数据库多级安全问题。

    youdao

  • Thesis researches how to put together SSL and database security, and put forward a database security proxy model. Based on all the work, we developed and realized a simple database security proxy.

    本文研究如何SSL数据库安全有机地结合起来提出基于SSL的数据库安全代理模型,并此基础上设计实现了一个简单的数据库安全代理。

    youdao

  • Based on feasibility analyzing and system demand analyzing, emphatically expounds design-project, functional model, interface designing database system designing, security design in this paper.

    可行性研究需求分析基础上,对系统设计方案、功能模块接口设计、数据库系统设计和安全设计等进行了较详细的论述

    youdao

  • In makes an applied multi-level relation model to be basement of security database for following the BLP model.

    为了适应BLP模型,采用一种实用多级关系 模型作为安全数据库基础原有 关系 模型的扩展。

    youdao

  • The paper analyzes the current research actuality of network database, and brings forward the general security model of network database.

    分析当前网络数据库安全研究现状提出了网络数据库安全模型

    youdao

  • Then the security information management model in the SKJ2004 project is taken as an example to describe the implementation process of heterogeneous distributed database systems based on CORBA.

    以正在研发数字矿井项目中的安全信息管理模块介绍基于CORBA异构分布式数据库系统实现方法

    youdao

  • In this paper, we proposed a formal security database system access model including a multilevel relation model and a element-level authorization.

    提出了安全数据库访问控制模型包括一个多层关系模型一个用以增强自主访问控制能力的元素级粒度的授权。

    youdao

  • Several popular access technologies are introduced and a primary security model of Web Database is given in the paper.

    本文介绍了几种流行Web数据库访问技术,同时针对Web数据库的安全问题给出了一个初步的安全模型

    youdao

  • Several popular access technologies are introduced and a primary security model of Web Database is given in the paper.

    本文介绍了几种流行Web数据库访问技术,同时针对Web数据库的安全问题给出了一个初步的安全模型

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定