• Returns the access control security for the current registry key.

    返回当前注册表项访问控制安全性

    youdao

  • Access control security strategy is to preserve the legality of the database users.

    访问控制策略保证数据库的访问者身份合法性。

    youdao

  • Returns the specified sections of the access control security for the current registry key.

    传回目前登录机码之存取控制安全性指定区段

    youdao

  • There are two aspects included in database system security, which is access control security strategy and communication channel security.

    数据库系统安全性主要包括两个方面访问控制策略传输通道安全

    youdao

  • An administrator can also assign an access control list to each work node for additional security control at the work node level.

    管理员可以每个工作节点分配访问控制列表进一步工作节点级别上进行安全控制。

    youdao

  • These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    youdao

  • The system must provide security and control access to those functions based on permissions.

    系统必须提供安全性根据相应的权限控制这些功能访问

    youdao

  • However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.

    不过不必担心安全问题因为文件系统访问控制机制通常都可以提供充分的保护。

    youdao

  • The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.

    架构需要涉及许多问题安全性访问控制服务水平协议,直到业务工作流事件处理信息管理和业务规则。

    youdao

  • Some file systems support advanced security features, such as access control lists (ACLs).

    某些文件系统支持高级安全特性比如访问控制列表(acl)。

    youdao

  • Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.

    当然不是所有应用程序都会访问关键数据这些程序开发人员确实能够通过加入访问控制增强应用程序的安全

    youdao

  • Thus, management retains control over who can access each specific set of models, which prevents potential security violations.

    因此管理保留了访问模型特定集合控制权就阻止了潜在安全性入侵

    youdao

  • Access control. Enables the system to recognize security policies for groups of users.

    访问控制使系统能够识别用户安全性策略

    youdao

  • Rules for access control are configured as Security Rules.

    访问控制规则配置安全规则。

    youdao

  • Pulling together information from a variety of sources also carries with it security concerns, including access control.

    多种来源信息整合在一起将带来包括访问控制在内的安全性问题

    youdao

  • Transport-layer security, message-layer security, threat protection, identity and access controlsecurity is truly a first class citizen, and the gateways have the certifications to prove it.

    传输层安全消息级安全、入侵保护身份认证访问控制——安全的确一等公民而且网关证书证实这一点

    youdao

  • Security administrators can control access to their databases at a level of abstraction that is close to the structure of their organizations.

    安全管理员可以接近组织结构抽象层次上控制数据库访问

    youdao

  • If access to projects is a concern, then you can create security policies that control access to certain groups.

    如果项目访问您所关注的,那么应该创建安全策略控制一定能够访问项目。

    youdao

  • Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.

    或许需要访问现有库存控制系统客户数据库基于大型机安全性访问控制服务

    youdao

  • When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.

    配置服务服务器外运行时,没有其实施访问控制因为管理安全基础结构是在服务器内运行

    youdao

  • Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.

    服务安全性重点管理联合标识服务访问控制确保能安全访问服务和应用程序以及使服务的安全策略得到一致执行

    youdao

  • Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    安全策略定义安全标签组成指定控制敏感数据访问规则

    youdao

  • The security policy is used for access control checks, which are performed by the JVM at runtime.

    安全策略用于访问控制检查JVM运行时执行的。

    youdao

  • Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.

    文档控制安全:目的是为了管理业务为主的信息访问以及使用数字签名验证文档的真实性

    youdao

  • New access-control methods will also be introduced as research into operating system security continues.

    随着对操作系统安全性的深入研究引入新的访问控制方法

    youdao

  • The quality of operation aspect is measured by being able to ensure a listener's ability to listen to arrival of data, ability to invoke a remote call as well as access control and transport security.

    操作方面质量通过保证监听监听数据到达、发起远程调用以及访问控制和传输安全性等功能判断的。

    youdao

  • LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.

    LBACMandatoryAccess Control (MAC)一个实现存储在数据库中的敏感数据提供了较高级别的安全保障

    youdao

  • DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.

    DB 2提供基于标签访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性

    youdao

  • Have security requirements like access control and data privacy been met in both existing and legacy systems?

    访问控制数据隐私等安全要求现有遗留系统得到满足了吗?

    youdao

  • Have security requirements like access control and data privacy been met in both existing and legacy systems?

    访问控制数据隐私等安全要求现有遗留系统得到满足了吗?

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定