这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
数据屏蔽(例如,在开发和测试中使用的主数据,如果法规需要这样做的话);这没有显示在图1中。
Data masking (for example, for master data used in development and test, if regulations require it); not shown in Figure 1.
RDE算法主要应用了随机延迟计算的机制,MRDE算法则进一步增加了屏蔽运算,而MRRE算法则结合数据屏蔽技术和随机重编码方法。
The RDE and MRDE algorithm employ the method of random delayed computing, and MRDE algorithm has masking operation. The MRRE algorithm combines data masking and random recoding techniques.
就此您可能已经看出这些讨论的重要性,它表明,数据绑定的一个优点是能够向程序员屏蔽更加复杂的API。
It's here that you can begin to see why this discussion is important — it reveals that one of data binding's advantages is its ability to shield the programmer from more complex APIs.
这里就是存储屏蔽数据的地方,直到它被转化成了一个CSV文件。
This is where the masked data will be stored until it is converted into a CSV file.
是否创建带有可选屏蔽的测试数据子集。
Whether a test data subset with optional privacy masking should be created.
数据联合模式的一个非常重要的好处是,能够屏蔽在源系统中实现的很多模型更改。
A very significant benefit to the data federation pattern is the ability to mask off many model changes which may be implemented in the source systems.
在很多情况下都需要屏蔽文本文件数据。
There are many occasions where you may need to mask flat file data.
在完成定义之后,您提取出数据,将条目转化为一个屏蔽的.xf文件,然后将. xf文件转化为CSV文件。
After the definitions were completed, you extracted the data, converted the entries into a masked.xf file, and then converted the.xf file to a CSV file.
Optim在数据隐私方面还提供了几个其他函数,用于提供各种屏蔽功能。
There are several other functions available in Optim in the data privacy area that provide various masking functions. For example, some of the functions include.
这些类别帮助确定对指定的数据使用哪种数据隐私屏蔽算法。
These categories help determine which of the data privacy masking algorithms to use for the specified data.
AD包含其他元数据,这些元数据关于表之间的关系和依赖性、其他表的信息和隐私屏蔽信息。
The AD contains additional metadata about the relationships and dependencies between these tables, information about other tables, and privacy masking information.
在屏蔽数据以及将数据转化为CSV文件时,这些映射文件将会得到引用。
These map files are referred to when masking the data and when converting the data to a CSV file.
随后,曾在微软亚洲研究院从事搜索和数据挖掘研究工作的陈传亮通过统计分析,将粉丝中的那些无效帐号全部屏蔽掉。
Chen, who used to do search and data mining for Microsoft Asia Research Institute, then ran a statistical analysis and screened all the null accounts among his fans.
该过程使用列映射,来将提取的数据转化为屏蔽的数据。
This procedure uses the column map to convert the extracted data into masked data.
然后,创建一个域模型和一组原子域,每个原子域都描述特定域所需的数据隐私屏蔽方法,比如信用卡数据。
The data architect then creates a domain model, along with a set of atomic domains, each describing the required data privacy masking methods for a particular domain, such as credit card data.
在带有敏感数据的环境中,不仅需要屏蔽传统的关系数据库中的数据,还需要屏蔽可能用于测试场景的文本文件。
With the current environment of data sensitivity, there is a need to mask data not only in the traditional relational databases, but also in flat files that could be part of a testing scenario.
他为开发人员使用的GSDB数据库定义了数据隐私屏蔽规则和方法。
He has defined the data privacy masking rules and methods for the GSDB database that his developers use.
屏蔽是针对数据的,所以表数据明显是该请求的一部分。
The masking is for the data, so it is evident that the table data should be part of this request.
使用嵌入式SQL,数据库编程的复杂性可以通过一些宏子语言来屏蔽。
With Embedded SQL, the intricacies of database programming are masked by a sort of macro sub-language.
当您在将数据库中的提取数据转化为新的屏蔽数据时,您将会用到它。
You will use it when you convert the extracted data in the database to the new masked data with the masking definition that is contained in this file.
Optim提供了强大的数据转换功能,可以屏蔽或转换某些个人信息,这样您就可以使用机密数据进行应用测试了。
Optim provides powerful data transformation capabilities to mask or convert certain personal information so that confidential data can be made available for application testing.
在这个场景中,Tom选择创建一个仅包含特定隐私屏蔽元数据的新模型。
In this scenario, Tom chooses to create a new model containing only the domains that contain this particular privacy masking metadata.
通过对褶皱芯材结构的电磁屏蔽实验数据和计算公式所得结果作对比分析,评价了该种结构对屏蔽效能的有益影响。
The data via shield efficiency experiments and calculated by the formula are compared and the profitable effect on shield efficiency of the structure are also evaluated.
我相信是机器屏蔽了撒马利亚人,墙住了芬奇及其助手的全部相关数据。
I believe the machine is blinding Samaritan by blocking all the relevant data on Mr. Finch and his associates.
该区域的地质数据在采集过程中不可避免地存在数据的各向异性、特高值屏蔽、噪声等原因易导致出现假异常,因此需要对该区域的地质数据需要进行特别的处理研究。
Because of upper shielding, noise during the course of collecting data may be led to fault anomaly. So it is necessary to study the data of this area.
该方法实现简单,但存在缺陷:由于附加块信息不同于正常通信过程,恶意用户容易察觉通信具有密钥恢复功能,使用数据包过滤方法,就可以完全屏蔽密钥恢复功能。
The implementation is practical but with obvious disadvantage: the illegal user can easily notice the key recovery, and by data package filtering, the key recovery function can be screened.
所以,传输的电力要足够的低,确保不会烧坏很细的金属线,也不能对通过相邻的非屏蔽线所传送的数据信号造成影响。
Therefore, transmitting electricity must be low enough to ensure that it will not burn the thin metal wire, also cannot make any implications to adjacent non- shield lane transmitting data signals.
目前使用的屏蔽数据通信电缆通常为单层或双层铜丝编织结构,生产效率低,成本高。
At present, the shielded category cables use single or double copper braid as shield, which features low productivity and high costs.
目前使用的屏蔽数据通信电缆通常为单层或双层铜丝编织结构,生产效率低,成本高。
At present, the shielded category cables use single or double copper braid as shield, which features low productivity and high costs.
应用推荐