• 文章分析了SYBASE数据管理系统安全控制机制基于角色数据访问控制模型

    This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    youdao

  • 包括识别认证授权访问控制数据屏蔽审计加密

    This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.

    youdao

  • 通过维护用户访问控制列表来提供功能数据权限

    Provide functional and data entitlement by maintaining access control lists of users.

    youdao

  • 控制数据访问另一种流行方法使用存储过程

    Another popular method of controlling access to table data is through the use of stored procedures.

    youdao

  • 作为一项最佳实践应考虑使用存储过程控制数据访问

    As a best practice, consider using stored procedures as a way to control access to your data.

    youdao

  • 服务器需要查询语法选择操作完整实现以及为了数据安全需要访问控制事务支持功能。

    The server side requires a complete implementation of the query syntax, selection as well as access control and transaction support required to expose the data safely.

    youdao

  • 利用服务支持租户维护配置自己组织结构访问控制数据

    A utilization service support tenants to maintain and configure their specific organization structure and access control data.

    youdao

  • 安全策略定义安全标签组成指定控制敏感数据访问规则

    Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    youdao

  • 随着企业雇员人数增长维护数据适当访问控制成为一项挑战

    As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.

    youdao

  • 除了简单地提供商务逻辑之外,应用程序必须支持访问安全控制数据持久化事务其它进阶功能

    Beyond simply providing business logic, applications must support secure access, persistence of data, transactional behavior, and other advanced features.

    youdao

  • 访问控制数据隐私等安全要求现有遗留系统得到满足了吗?

    Have security requirements like access control and data privacy been met in both existing and legacy systems?

    youdao

  • 通过配置方法支持与租户相关UI访问控制过程数据模型

    The customization mechanism to support tenant-specific UI, access control, process and data model via configuration approaches.

    youdao

  • 虚拟热点数据访问可以通过不同APN(网络数据路由访问)进行路由,并且可以通过iphone数据计划控制设备的网络访问速度

    Data access over the virtual hotspot may be routed through a different APN (the data routing access point for the network) and charged under different rates to the main iPhone data plan.

    youdao

  • 于是通过这个视图就可以控制数据访问而不必使用

    Access to the data could then be governed through the view, instead of the base table.

    youdao

  • 用户身份丢失有些企业知道访问数据所有用户的身份,以便进行访问控制

    Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.

    youdao

  • 这会数据本机访问控制审核功能价值带来影响。

    This undermines the value of the database's native access control and auditing function.

    youdao

  • 尽管DB 2优化选择最佳访问路径有所帮助,但结果还是依赖输入数据,优化器无法访问控制这些数据

    Although the DB2 optimizer is helpful for selecting the best access path, the result depends on the input data, which is often not accessed or controlled by the optimizer.

    youdao

  • 这儿问题现有应用通过实现数据存取验证逻辑有效控制企业数据访问

    The issue here is that existing applications effectively control enterprise data access through implementation of the data access and validation logic.

    youdao

  • 如果数据环境中很多用户而且数据库实例访问必须进行控制就可能出现此种情况。

    This is possible if the database environment has a large number of users and access has to be controlled to the database instance.

    youdao

  • 这些方法使用控制数据访问下一步中定义

    The control data accessors used in the methods are defined in next step.

    youdao

  • 之所以这样,其他绑定包可以导入这种情况下所以JPA实体可以访问数据也得到控制

    This makes it so they are available to import by other bundles and, in this case, so the JPA entities can be accessed and data manipulated.

    youdao

  • 服务定义业务逻辑(控制)以及数据(实体)访问分离,可确保实体不会透露任何业务逻辑。

    Decoupling the service definition from the business logic (controller) and from access to the data (entity) ensures that no business logic manifests itself in the entities.

    youdao

  • 另外操作性模式中,应用程序通过服务使用数据这些服务控制数据创建管理质量访问

    Furthermore, in operational mode, master data is leveraged by applications through services, where services provide control over master data creation, management, quality, and access.

    youdao

  • 最终用户身份丢失为了进行访问控制企业需要了解实际访问数据用户身份。

    Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.

    youdao

  • 登录期间创建安全标志(LTPA)数据请求传递系统使后端系统可以执行授权从而提供数据控制访问

    The security token (LTPA) created during the login is passed with data requests to back-end systems to enable them to perform authorization in providing controlled access to the data.

    youdao

  • 锁定数据管理器用控制多个应用程序并发访问数据数据机制

    Locking is the mechanism that the database manager USES to control concurrent access to data in the database by multiple applications.

    youdao

  • 系统应该提供相应机制以便使用自行管理环境中的用户数据用户进行身份验证,使用按需环境中的访问控制数据进行授权

    The system should provide mechanisms to authenticate users with user data residing in the on-premise environment, and authorize with access control data residing in an on-demand environment.

    youdao

  • 或许需要访问现有库存控制系统客户数据基于大型机安全性访问控制服务

    Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    youdao

  • 在线策略用于加密写到文件系统数据以及通过访问控制保护数据

    An online policy is used for encrypting data written to a file system and protecting data with access control.

    youdao

  • 保持数据完整性的同时它们控制数据访问在内部当前事务数据锁定进行管理

    They control access to the back-end data and internally manage current transactions and database locking while preserving data integrity.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定