每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
它收集了极端天气告知,安全系统,军事行动以及应急管理系统的数据。
It collects data for extreme weather notification and safety systems, military operations, and emergency management systems.
问题也来了,即按照这种方式管理个人或企业数据付出的成本可能是隐私和安全。
The problem is that the cost of managing personal or corporate data this way may be privacy and security.
这些策略由安全服务器集中管理,并且发送到根据需要保护数据的代理。
The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.
在这种情况下,字段隐藏为用户提供的是接口管理,而不是真正的数据安全。
In this case, field hiding provides user interface management rather than true data security.
典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
打个比方,我们需要元数据对治理、安全、或注册库的生命周期进行管理,此时就应该选择存储库。
Life cycles for governance, security or registries, for example, will need to house metadata to manage the life cycle and a repository is just such a choice.
多数情况下,视图访问为用户提供的是管理接口,而不是真正的数据安全(参见图3)。
Mostly, view access provides user interface management rather than true data security (see figure 3).
如果Tomcat仅用该数据库来获得容器管理的安全性,那么这就是最简单的解决方案。
This is the simplest solution if the database is used exclusively by Tomcat for container managed security.
数据安全性、保留和管理将是与标准有关的讨论以及编程约定的一部分。
Data security, retention, and management will be part of your standards discussion as well as programming conventions.
在研究如何使用RFIDIC的安全特性之前,本文先回顾rfid数据管理的一些背景信息。
Before examining how to use the security features of RFIDIC, this article reviews some background information on RFID data management.
即使是数据库管理员使用的实用工具也会引起安全问题,如果租户可以使用它们访问,或者更糟,操作不属于它们的数据的话。
Even utility tools used by database administrators can be security concerns if the tenants can use them to access, or worse yet, manipulate data that does not belong to them.
联系您的数据库管理员或参考db 2文档了解关于您的DB 2实例的安全配置的更多信息。
Contact your database administration or refer to the DB2 documentation for more information about the security configuration of your DB2 instance.
系统管理:数据管理、数据仓库安全性、系统和数据库的备份和恢复,等等。
System management: data management, data warehouse security, system and database backup and recovery, and so on.
本文阐述了将定制的安全性插件部署到DB 2系统前,插件编写人员或数据库管理人员应该测试的内容。
This article explains what the plug-in writer or database administrator should test before deploying the customized security plug-ins to the DB2 system.
FENCED或NOT FENCED:这个子句指定例程是否被认为可以在数据库管理器操作环境的进程或地址空间中“安全地”运行。
FENCED or NOT FENCED: This clause specifies whether the routine is considered "safe" to run in the database manager operating environment's process or address space.
银行使用的数据库必须迅速地找到相关信息,安全地管理交易、安全地与用户交互,而最重要的是不能丢失任何数据!
The database your bank USES must quickly locate the relevant information, safely manage the transactions, securely interact with users, and — most important — not lose any data!
在导入之后,由一个DB代理加密并由一个安全服务器管理的数据库备份映像可以恢复到由另一个安全服务器管理的另一个db代理。
By doing so, a database backup image encrypted by one DB agent and managed by one security server, can be restored to another DB agent managed by another security server.
UDDI规范的下一版本计划在2002年年中推出,重点在安全性、高级数据管理以及进一步的国际化上。
The next version of the UDDI Specification planned for mid-2002 will focus on security, advanced data management, and further internationalization.
内容和门户管理员必须使用内容属性和元数据(包括用于安全策略的内容属性和元数据)标识所有内容。
All content must be tagged with content attributes and metadata, including those for security policies, by content administrators and portal administrators.
每个实例还具有自己的配置文件,数据库管理器配置文件(DBMCFG)用于进行实例级的安全、性能变量和通信配置。
Each instance also has its own configuration file, the Database Manager configuration file (DBM CFG) for instance level security, performance variables, and communication configuration.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
The database security administrator allows users access to protected data by granting them security labels.
数据库安全管理员对角色从属关系有严密的控制。
The database security administrator has tight control on the role membership.
其中许多安全性方面对于数据库管理员是已知的。
Many of these security aspects are known to a database administrator.
安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
The security administrator allows users access to protected data by granting them security labels.
特别地,你会得到一个安全的CMS以管理数据,一个根据你的数据模型而定制的AS 3SWC文件及全部文档。
Specifically, you get a secure CMS to manage your data, an AS3 SWC file of classes tailored to your data model, and full documentation.
这是一款轻量级工具,能够集中化对数据库连接池、财务和安全性的管理。
It's a lightweight tool that centralizes management of database connection pooling, accounting, and security.
客户机虚拟化的优点是,提供更高的数据安全性,更容易管理,减少最终用户的停机时间,确保业务连续性。
The advantage of client virtualization is that it provides higher data security, easier manageability, decreases end-user downtime, and ensures business continuity.
然而,由负责保护数据安全的组织管理的内部审核以及变更流程,可帮助防止安全缺失。
However, internal reviews and change processes, managed by the organization responsible for safeguarding the data, help prevent security misses.
然而,由负责保护数据安全的组织管理的内部审核以及变更流程,可帮助防止安全缺失。
However, internal reviews and change processes, managed by the organization responsible for safeguarding the data, help prevent security misses.
应用推荐