Provide data governance capabilities to enforce and audit both transaction and data access security.
提供数据治理功能,实现并审计事务和数据访问安全。
To access these data stores, you need to create and appropriately configure security realms.
要访问这些数据存储,您需要创建并适当地配置安全领域。
The core concept is to centralize all security decisions in the gateway and prevent unwanted data access.
核心思路是把所有安全决策集中在网关,防止不希望出现的数据访问。
In particular, it examined access to enterprise data, privacy and security concerns, and some lightweight development tools.
特别是,其中研究了企业数据访问、隐私和安全顾虑,以及某些轻量级开发工具。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
The provision to access persistent data as resources by a remote client raises data privacy and security concerns.
向一个远程客户端提供持久化数据访问可能会引起数据保密和安全问题。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.
描述其位置、系统、访问方法、源数据流通和更新频率、数据安全性和数据质量。
When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.
当另一个用户需要访问该文件时,在授予对数据的访问权限之前,将验证其安全凭据,既使这些文件数据已经以明文格式存在于内存中。
Explore enterprise changes required to build such an environment and the challenges you must address while building it, including access to enterprise data, and privacy and security concerns.
探索构建此类环境所需的企业改变和在构建时必须解决的问题,其中包括企业数据的访问以及隐私和安全问题。
Companies and policy makers must also tackle misaligned incentives around issues such as privacy and security, access to data, and technology deployment.
企业和政策制定者必须克服这些关于隐私安全、数据访问、技术部署等问题的不对称诱因。
Similarly, each database user is assigned a security label that determines which labeled data rows or columns he or she can access.
类似地,每个数据库用户也都被赋予一个安全标签,这个标签将决定他/她可以访问哪些贴了标签的数据行或列。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
When data grid security is enabled, only authorized users can access data in the data grid.
当数据网格安全启用时,只有经过授权的用户才能访问数据网格中的数据。
The database security administrator allows users access to protected data by granting them security labels.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
When a user tries to access protected data, his security label is compared to the security label that is protecting the data.
当一个用户试图访问受保护的数据时,必须将他的安全标签与保护数据的安全标签进行比较。
The security administrator allows users access to protected data by granting them security labels.
安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.
IDSLBACREADSET:要访问数据,用户安全标签的每个集合组件必须包括数据安全标签的集合组件。
An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing.
豁免权使用户可以访问其安全标签不允许其访问的受保护数据。
Each user should have access to a security level based upon the level of data sensitivity he or she can see.
根据用户可以看到的数据的敏感性级别,每个用户都应该可以访问某个安全级别。
The data to be processed is typically not confidential or sensitive, therefore there are minimal security requirements; and transactional data access is atypical.
要处理的数据通常并不是机密数据或者敏感数据,因此存在最小限度的安全需求;并且通常不需要进行事务性的数据访问。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
When a user tries to access protected data, that user's security label is compared to the security label protecting the data.
当一个用户试图访问受保护的数据时,该用户的安全标签将与用于保护该数据的安全标签相比较。
When a user tries to access labeled data, his LBAC credentials are compared to security label protecting data to see if access is allowed.
当一个用户试图访问带标签的数据时,要将他的LBAC凭证与保护数据的安全标签进行比较,以确定是否允许访问。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.
现今的资料存取控制可精细到个别资料格中的资讯,以便为重要资料及机密客户资讯,提供更严密的安全防护。
Similarly, each database user is assigned a security label that determines which labeled data (rows or columns) he or she can access.
类似地,每个数据库用户也被赋予一个安全标签,该标签决定他/她可以访问具有哪种标签的数据(行或列)。
IDSLBACREADARRAY: Each array component of the user security label must be greater than or equal to the array component of the data security label to allow access to data.
IDSLBACREADARRAY:要访问数据,用户安全标签的每个数组组件必须大于或等于数据安全标签的数组组件。
IDSLBACWRITEARRAY: Each array component of the user security label must be equal to the array component of the data security label to allow access to data.
IDSLBACWRITEARRAY:要访问数据,用户安全标签的每个数组组件必须等于数据安全标签的数组组件。
应用推荐