文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
通过维护用户的访问控制列表来提供功能和数据权限。
Provide functional and data entitlement by maintaining access control lists of users.
控制对表数据的访问的另一种流行方法是使用存储过程。
Another popular method of controlling access to table data is through the use of stored procedures.
作为一项最佳实践,应考虑使用存储过程来控制对数据的访问。
As a best practice, consider using stored procedures as a way to control access to your data.
服务器端需要查询语法、选择操作的完整实现,以及为了数据安全而需要的访问控制和事务支持功能。
The server side requires a complete implementation of the query syntax, selection as well as access control and transaction support required to expose the data safely.
利用服务支持租户维护和配置自己的组织结构和访问控制数据。
A utilization service support tenants to maintain and configure their specific organization structure and access control data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。
As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.
除了简单地提供商务逻辑之外,应用程序必须支持访问安全控制,数据持久化,事务,和其它的进阶功能。
Beyond simply providing business logic, applications must support secure access, persistence of data, transactional behavior, and other advanced features.
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
Have security requirements like access control and data privacy been met in both existing and legacy systems?
通过配置方法支持与租户相关的UI、访问控制、过程和数据模型。
The customization mechanism to support tenant-specific UI, access control, process and data model via configuration approaches.
虚拟热点上的数据访问可以通过不同的APN(网络的数据路由访问点)进行路由,并且可以通过主iphone的数据计划控制设备的网络访问速度。
Data access over the virtual hotspot may be routed through a different APN (the data routing access point for the network) and charged under different rates to the main iPhone data plan.
于是,通过这个视图就可以控制对数据的访问,而不必使用基表。
Access to the data could then be governed through the view, instead of the base table.
用户身份的丢失:有些企业想知道访问数据库的所有用户的身份,以便进行访问控制。
Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.
这会对数据库本机访问控制和审核功能的价值带来影响。
This undermines the value of the database's native access control and auditing function.
尽管DB 2优化器对选择最佳访问路径有所帮助,但结果还是依赖于输入数据,优化器无法访问或控制这些数据。
Although the DB2 optimizer is helpful for selecting the best access path, the result depends on the input data, which is often not accessed or controlled by the optimizer.
这儿的问题是现有应用通过实现数据存取和验证逻辑有效控制了企业数据的访问。
The issue here is that existing applications effectively control enterprise data access through implementation of the data access and validation logic.
如果数据库环境中有很多用户,而且对数据库实例的访问必须进行控制,这就可能出现此种情况。
This is possible if the database environment has a large number of users and access has to be controlled to the database instance.
这些方法中使用的控制数据访问器在下一步中定义。
The control data accessors used in the methods are defined in next step.
之所以这样,其他的绑定包就可以导入它了,在这种情况下,所以JPA实体就可以访问了,数据也得到控制了。
This makes it so they are available to import by other bundles and, in this case, so the JPA entities can be accessed and data manipulated.
将服务定义同业务逻辑(控制器)以及数据(实体)访问分离,可确保实体中不会透露任何业务逻辑。
Decoupling the service definition from the business logic (controller) and from access to the data (entity) ensures that no business logic manifests itself in the entities.
另外,在操作性模式中,应用程序通过服务使用主数据,这些服务控制主数据的创建、管理、质量和访问。
Furthermore, in operational mode, master data is leveraged by applications through services, where services provide control over master data creation, management, quality, and access.
最终用户身份丢失:为了进行访问控制,企业需要了解实际访问数据库的用户的身份。
Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.
登录期间创建的安全标志(LTPA)随数据请求传递到后端系统,使后端系统可以执行授权,从而提供对数据的有控制的访问。
The security token (LTPA) created during the login is passed with data requests to back-end systems to enable them to perform authorization in providing controlled access to the data.
锁定是数据库管理器用来控制多个应用程序并发访问数据库中数据的机制。
Locking is the mechanism that the database manager USES to control concurrent access to data in the database by multiple applications.
系统应该提供相应的机制,以便使用自行管理环境中的用户数据对用户进行身份验证,并使用按需环境中的访问控制数据进行授权。
The system should provide mechanisms to authenticate users with user data residing in the on-premise environment, and authorize with access control data residing in an on-demand environment.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
在线策略,用于加密写到文件系统的数据,以及通过访问控制保护数据。
An online policy is used for encrypting data written to a file system and protecting data with access control.
在保持数据完整性的同时,它们控制对后端数据的访问并在内部对当前事务和数据库锁定进行管理。
They control access to the back-end data and internally manage current transactions and database locking while preserving data integrity.
应用推荐