• 保持数据完整性的同时它们控制端数据的访问在内部当前事务数据库锁定进行管理

    They control access to the back-end data and internally manage current transactions and database locking while preserving data integrity.

    youdao

  • 指定管理DN用于访问控制限制数据库操作

    Specify the administrative DN, which not subject to access control or restrictions for operations on this database.

    youdao

  • 企业bean控制数据访问并且在内部管理当前事务数据库锁定

    The enterprise beans control access to the back-end data and internally manage the current transactions and database locking.

    youdao

  • 正如前面提到的那样,EJB组件控制后台数据访问管理当前事务数据库内部锁定

    As mentioned previously, the EJB components control the access to the back-end data and manage the current transactions and database locking internally.

    youdao

  • 锁定数据库管理器用控制多个应用程序并发访问数据库数据机制

    Locking is the mechanism that the database manager USES to control concurrent access to data in the database by multiple applications.

    youdao

  • EJB组件控制后台数据访问管理当前事务以及数据库内部锁定

    The EJB components control the access to the back-end data and manage the current transactions and database locking internally.

    youdao

  • 安全管理可以接近组织结构抽象层次上控制数据库访问

    Security administrators can control access to their databases at a level of abstraction that is close to the structure of their organizations.

    youdao

  • 通过分析r BAC模型结构,提出并设计实现统计管理系统数据库安全访问控制方法

    A novel method for designing and implementing database safe access control in a statistic management system is proposed on the basis of analyzing RBAC model.

    youdao

  • 最后论文基于UO BAC模型设计权限管理方案应用于录井信息服务平台中,实现录井公司中心数据库访问控制

    Finally, the paper will apply design program of rights management based on UOBAC model to logging information service platform to achieve access control of a logging company central database.

    youdao

  • 文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    youdao

  • 当前一些大型网络数据库管理系统(DBMS)的安全性方法主要包括身份认证访问控制审计跟踪数据备份一些更为敏感和重要的数据,需要进行数据加密或者容灾系统的设计。

    The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.

    youdao

  • 网络管理通过直接访问管理配置数据库文件而获得权力控制能力

    Network administrators also gain power and control through the ability to directly access and manipulate configuration database files.

    youdao

  • 网络管理通过直接访问管理配置数据库文件而获得权力控制能力

    Network administrators also gain power and control through the ability to directly access and manipulate configuration database files.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定