个人应该对自己的数据访问控制。
The individual should have control over the access to their own data.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
这包括识别、认证、授权、访问控制、数据屏蔽、审计和加密。
This includes identification and authentication, authorization, access control, data masking, auditing, and encryption.
通过维护用户的访问控制列表来提供功能和数据权限。
Provide functional and data entitlement by maintaining access control lists of users.
控制对表数据的访问的另一种流行方法是使用存储过程。
Another popular method of controlling access to table data is through the use of stored procedures.
作为一项最佳实践,应考虑使用存储过程来控制对数据的访问。
As a best practice, consider using stored procedures as a way to control access to your data.
服务器端需要查询语法、选择操作的完整实现,以及为了数据安全而需要的访问控制和事务支持功能。
The server side requires a complete implementation of the query syntax, selection as well as access control and transaction support required to expose the data safely.
利用服务支持租户维护和配置自己的组织结构和访问控制数据。
A utilization service support tenants to maintain and configure their specific organization structure and access control data.
控制表数据访问的一种常见方法是使用视图。
A common way to control access to table data is using views.
特定的控制流会决定以何种顺序访问数据。
The specified control flow determines the order in which the data is accessed.
随着企业中雇员人数的增长,维护对数据的适当访问控制成为一项挑战。
As the number of employees in your organization grows, it can be a challenge to maintain the appropriate access control of your data.
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
Have security requirements like access control and data privacy been met in both existing and legacy systems?
使用存储过程来控制数据访问。
使用视图来控制数据访问。
通过数据访问API进行控制。
使用LBAC来控制数据访问。
控制对敏感数据的访问。
要为WebSphereCommerce访问控制问题收集数据。
To collect data for a WebSphere Commerce access control issue.
虚拟热点上的数据访问可以通过不同的APN(网络的数据路由访问点)进行路由,并且可以通过主iphone的数据计划控制设备的网络访问速度。
Data access over the virtual hotspot may be routed through a different APN (the data routing access point for the network) and charged under different rates to the main iPhone data plan.
于是,通过这个视图就可以控制对数据的访问,而不必使用基表。
Access to the data could then be governed through the view, instead of the base table.
更好的解决方案可能是通过使用模式控制数据库对象访问。
A better solution might be to control database object access through the use of schemas.
用户身份的丢失:有些企业想知道访问数据库的所有用户的身份,以便进行访问控制。
Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.
这会对数据库本机访问控制和审核功能的价值带来影响。
This undermines the value of the database's native access control and auditing function.
尽管DB 2优化器对选择最佳访问路径有所帮助,但结果还是依赖于输入数据,优化器无法访问或控制这些数据。
Although the DB2 optimizer is helpful for selecting the best access path, the result depends on the input data, which is often not accessed or controlled by the optimizer.
这儿的问题是现有应用通过实现数据存取和验证逻辑有效控制了企业数据的访问。
The issue here is that existing applications effectively control enterprise data access through implementation of the data access and validation logic.
这些方法中使用的控制数据访问器在下一步中定义。
The control data accessors used in the methods are defined in next step.
访问控制确保只有拥有正确权限的用户才能访问数据和内容。
Access control ensures that only people with correct rights can access data and content.
数据库可执行访问控制。
最终用户身份丢失:为了进行访问控制,企业需要了解实际访问数据库的用户的身份。
Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.
LDAP目录还对访问数据的方式提供更好的控制。
The LDAP directory provides better control over the way data is accessed.
应用推荐