在保持数据完整性的同时,它们控制对后端数据的访问并在内部对当前事务和数据库锁定进行管理。
They control access to the back-end data and internally manage current transactions and database locking while preserving data integrity.
指定管理DN,它不用于访问控制或限制数据库的操作。
Specify the administrative DN, which not subject to access control or restrictions for operations on this database.
企业bean控制对后端数据的访问,并且在内部管理当前事务和数据库锁定。
The enterprise beans control access to the back-end data and internally manage the current transactions and database locking.
正如前面提到的那样,EJB组件控制着对后台数据的访问,并管理着当前事务和数据库的内部锁定。
As mentioned previously, the EJB components control the access to the back-end data and manage the current transactions and database locking internally.
锁定是数据库管理器用来控制多个应用程序并发访问数据库中数据的机制。
Locking is the mechanism that the database manager USES to control concurrent access to data in the database by multiple applications.
EJB组件控制着对后台数据的访问,并管理着当前事务以及数据库的内部锁定。
The EJB components control the access to the back-end data and manage the current transactions and database locking internally.
安全管理员可以在接近于组织结构的抽象层次上控制对数据库的访问。
Security administrators can control access to their databases at a level of abstraction that is close to the structure of their organizations.
通过分析r BAC模型结构,提出并设计实现了统计管理系统中数据库安全访问控制的新方法。
A novel method for designing and implementing database safe access control in a statistic management system is proposed on the basis of analyzing RBAC model.
最后,论文将基于UO BAC模型设计的权限管理方案应用于录井信息服务平台中,实现了录井公司中心数据库的访问控制。
Finally, the paper will apply design program of rights management based on UOBAC model to logging information service platform to achieve access control of a logging company central database.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
当前一些大型网络数据库管理系统(DBMS)的安全性方法主要包括:身份认证、访问控制、审计跟踪和数据备份,但对一些更为敏感和重要的数据,还需要进行数据加密或者容灾系统的设计。
The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.
网络管理员通过直接访问和管理配置数据库文件而获得了权力控制能力。
Network administrators also gain power and control through the ability to directly access and manipulate configuration database files.
网络管理员通过直接访问和管理配置数据库文件而获得了权力控制能力。
Network administrators also gain power and control through the ability to directly access and manipulate configuration database files.
应用推荐