A better solution might be to control database object access through the use of schemas.
更好的解决方案可能是通过使用模式控制数据库对象访问。
Loss of user identity: Some enterprises prefer to know the identity of all users accessing the database for access control purposes.
用户身份的丢失:有些企业想知道访问数据库的所有用户的身份,以便进行访问控制。
It provides step-by-step details on the procedure for customizing your database, and includes some hooks on how to control access rights to certain fields.
本文提供了定制数据库过程的一步步的细节内容,并且包括一些如何对某些字段控制访问权限的钩子函数。
As mentioned previously, the EJB components control the access to the back-end data and manage the current transactions and database locking internally.
正如前面提到的那样,EJB组件控制着对后台数据的访问,并管理着当前事务和数据库的内部锁定。
Loss of end-user identity: Enterprises need to know the identity of the actual user accessing the database for access control purposes.
最终用户身份丢失:为了进行访问控制,企业需要了解实际访问数据库的用户的身份。
Locking is the mechanism that the database manager USES to control concurrent access to data in the database by multiple applications.
锁定是数据库管理器用来控制多个应用程序并发访问数据库中数据的机制。
Once all required database objects and packages are created, use group membership and group privileges to control access to the created database objects and packages.
创建好所有必需的数据库对象和包之后,使用组成员关系和组特权来控制对所创建的数据库对象和包的访问。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
They control access to the back-end data and internally manage current transactions and database locking while preserving data integrity.
在保持数据完整性的同时,它们控制对后端数据的访问并在内部对当前事务和数据库锁定进行管理。
The EJB components control the access to the back-end data and manage the current transactions and database locking internally.
EJB组件控制着对后台数据的访问,并管理着当前事务以及数据库的内部锁定。
Access control: Fine-grained access control might be necessary via a database lookup primitive, or a service invoke to an application specific authorization service.
访问控制:细粒度的访问控制可能是必须的,通过一个数据库查找原语或对特定于应用程序的授权服务的调用实现。
Specify the administrative DN, which not subject to access control or restrictions for operations on this database.
指定管理DN,它不用于访问控制或限制数据库的操作。
The control logic makes use of COM objects (3) to access the database.
控制逻辑利用COM对象(3)来访问数据库。
LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.
LBAC是MandatoryAccess Control (MAC)的一个实现,它为存储在数据库中的敏感数据提供了较高级别的安全保障。
The enterprise beans control access to the back-end data and internally manage the current transactions and database locking.
企业bean控制对后端数据的访问,并且在内部管理当前事务和数据库锁定。
As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.
作为对基于标签的访问控制(LBAC)的DB 2 Viper 2数据库角色增强的一部分,可以对一个角色或组授予或收回安全标签或豁免权。
Label-based access control (LBAC), which provides new ways of controlling access to the sensitive data within the database.
基于标签的访问控制(LBAC),这为数据库中的敏感数据提供新的访问控制方法。
User roles and access control are inherent in Domino's database structure.
用户角色和访问控制都是Domino数据库结构中与生具来的特性。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
Update the access control list (ACL) of the database DomForInt.nsf to prevent Anonymous access and to grant appropriate roles to the users.
更新数据库domforint . nsf的访问控制列表(acl),以防止匿名访问以及向用户授权相应的角色。
Singletons often control access to resources such as database connections or sockets.
单例模式同样用于控制像数据库连接或者sockets这样的资源访问。
DB2 9.7 for LUW increases access control granularity, making it possible to give DBAs full control over a database without access to the actual data.
DB 2 9.7for LUW改进了访问控制粒度,让DBA可以全面控制数据库,而不必访问实际数据。
More database security: a new security feature called Label-Based access control (LBAC) allows you to control data access at the row and column level.
增强了数据库安全性:基于标签的访问控制(Label BasedAccess Control,LBAC)是一种新的安全特性,它使您可以在行和列的级别上控制数据访问。
Access Control Lists (ACLs) determining who can access each database and to what extent.
访问控制列表(Access Control List,ACL)确定谁能在多大范围内访问每个数据库。
The use of an access database to store test execution information means there's no unit-level change control over individual test cases or test plans.
一个保存测试执行信息的访问数据库的使用,意味着对于个体的测试案例或者测试计划没有单元级别的变更控制。
The database can enforce access control.
数据库可执行访问控制。
DB2 gives fine-grained control over performance and security characteristics of database access-and demands correspondingly careful attention.
DB 2对数据库访问的性能和安全特性施加细粒度的控制—因此需要更细致的处理。
For different users in the database, you can also control access to encrypted data.
对于数据库内不同的用户,也可以控制其对加密数据的访问。
This encryption method can control the user's access to the data of the application system, and the real data for all database users are not visible, is the safest way to encrypt.
这种加密方式可以控制应用系统的用户对数据的访问权限,并且真实数据对所有数据库用户都是不可见的,是最安全的一种加密方式。
The access plan can be collected with the db2expln command line tool or by right-clicking on your database in the DB2 Control Center and choosing the option Explain SQL.
可以通过 db2expln命令行工具,或者在DB2ControlCenter 中右键单击数据库并选择 Explain SQL选项来收集访问计划。
应用推荐