用户数据约束(user data constraint)满足了受限的请求应该经由受防护的传输层链接进行传输的需求。
A user data constraint establishes a requirement that the constrained requests be received over a protected transport layer connection.
可应用于任何安全模型的一种防护措施是分级数据访问。
One safeguard that can be placed on any security model is graduated data access.
数据库设计的经验表明,模式作为避免编程错误的防护措施很有用。
Experience with database design shows that schemas are most useful as a safeguard against programming errors.
防护模式进程是作为单独的系统实体创建的,以便将用户编写的防护模式代码与数据库管理器代理进程隔离开来。
Fenced mode processes are created as separate system entities in order to isolate user-written fenced-mode code from the database manager agent process.
虽然身为老板,他对数据泄漏负有责任,但鲜有证据表明索尼的防护系统就比业内其他公司的差。
He bears responsibility for the data breach, because he is the boss, but there is scant evidence that Sony's defences were worse than the rest of the industry's.
这一数据来自于亚利桑那州立大学物理学教授彼得·雷兹的一篇论文,这篇论文预计发表在《辐射防护剂量学》杂志上。
It comes from a paper by Arizona State University physics professor Peter Rez that is scheduled to appear in a journal called Radiation Protection and Dosimetry.
以上所述的几种加密方式,数据加密的位置离用户是逐步靠近的,防护能力也是逐步提升的。
Several encryption methods mentioned above, the location of data encryption is gradually close to the user, the protection ability is gradually enhanced.
设定爆破参数,计算装药量及防护平面布置,为同类地质条件下的控制爆破开挖提供参考数据。
The set blast parameter, counting explosive charge as well as protective site plan have offered reference data for engineering blasting in similar conditions.
纵向认证:采用认证、加密、访问控制等手段实现数据的安全传输以及纵向界的安全防护。
Longitudinal authentication: authentication, encryption, access control and other means to achieve the safe transmission of data and the security of the vertical sector.
根据智慧城市大量数据采集和交换的特点,重点实现访问控制的防护机制。
According to the characteristics of large amount of data collection and exchange in the smart city, the paper focuses on the protection mechanism of access control.
对敏感数据进行加密是数据安全防护中最核心的手段之一。
The encryption of sensitive data is one of the most important methods in data security.
我们将在会中与您分享关于云端、网络、本地及端点的安全防护方法,带您了解如何保护“身处各地”的用户与数据。
We will be at the meeting to share with you on the cloud, network, local and endpoint security methods, to help you understand how to protect the user and data everywhere.
文章论述了建立石油化工设备腐蚀与防护数据信息网的重要意义。
The significance of establishment of data information network of petrochemical equipment corrosion and protection was described.
结合中国石油独山子石化分公司(以下简称公司)设备腐蚀与防护的现状和需要,建立了石化公司腐蚀数据管理及评价系统。
A corporate corrosion data management and evaluation system has been established based upon the corrosion conditions and protection requirements of the equipment in Dushanzi Petrochemical Company.
目的:了解某钢铁厂噪声对工人身体健康的影响,以提供可靠数据,制定更好的防护措施。
Objective: to study the effect of noise pollution on workers' health in a steel iron plant so as to provide reliable data and to propose better protective measures.
研制了民用核设施的环境、辐射防护和三废数据管理软件。
The data management system for the environment of civil nuclear facilities, radiation protection and solid, liquid, gasses wastes was developed.
从以上数据可以看出,提高业务网站的安全防护,是保障业务正常进行的必然前提。
From above data can see, the security that enhances business website defends, it is the inevitable premise that ensures business on the rails.
若重组技术不成熟,将出现各种丢包、错组的情况,给数据库防护带来灾难。
If the reorganization technology is not mature, there will be a variety of packet loss, the wrong group of cases, to protect the database disaster.
在校园网站的管理工作中要注意分工协作、用户培训、安全防护和数据备份等问题。
Also we must pay attention to division and cooperation, user training, safe protection and data backup in the campus w...
本发明可用于军事、商业等领域的数据安全防护。
The invention can be used for the safety protection of data in the fields of military, commerce and the like.
在校园网站的管理工作中要注意分工协作、用户培训、安全防护和数据备份等问题。
Also we must pay attention to division and cooperation, user training, safe protection and data backup in...
其测量数据的积累对于雷电防护技术的提高具有重要意义。
It's important for improving the technology of lightning protection.
通过有限元仿真计算和现场性能试验,准确把握柔性防护网在规定的冲击能量作用下的最大变形数据。
For studying the deformation of flexible protection system accurately under the given impact, finite element analysis and performance test are carried out.
通过划伤试验和测试数据的可靠度分析,研究了三种管道外防护层的抗划伤性能。
The gouge resistance of three kinds of pipeline external coating was evaluated by using gouge test and data analysis of reliability.
显然,这些统计数据表明,如果使用了高质量的防护服和反光设备,溜冰者在事故中受重伤的风险将显著降低。
Clearly, these statistics indicate that by investing in high-quality protective gear and reflective equipment, roller skaters will greatly reduce their risk of being severely injured in an accident.
本文所研究的文档透明加密系统是一个完整数据泄漏防护解决方案的重要组成部分。
The file transparent encryption system proposed in this paper is an important part of a whole data loose prevention solution.
在校园网站的管理工作中要注意分工协作、用户培训、安全防护和数据备份等问题。
Also we must pay attention to division and cooperation, user training, safe protection and dat...
分析了通信数据的安全性,并设计了安全防护策略。
Analysed the safety of communication, designed program to make data security.
这些工作大大提高了数据库入侵防护系统的实用性,为进一步的研究工作奠定了良好的基础。
The impact of DIPS on database system and its intrusion detection and prevention is tested and analyzed.
这些工作大大提高了数据库入侵防护系统的实用性,为进一步的研究工作奠定了良好的基础。
The impact of DIPS on database system and its intrusion detection and prevention is tested and analyzed.
应用推荐