• The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.

    TCS要求控制关键系统资源分配释放包括数据库记录通信套接字安全密钥等等

    youdao

  • System management: data management, data warehouse security, system and database backup and recovery, and so on.

    系统管理数据管理、数据仓库安全性、系统数据库备份恢复等等

    youdao

  • It is capable of logging database events such as authorization checking, database object maintenance, security maintenance, system administration, and user validation.

    可以一些数据库事件例如授权检查、数据库对象维护安全性维护、系统管理用户验证等做日志记录。

    youdao

  • Computer system and network security are basis of security of distributed database system.

    计算机系统网络安全分布式数据库系统安全基础

    youdao

  • Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.

    同样如果系统侵入并受到破坏,那么数据库数据库访问信息存储正在运行Web服务器机器上会引发安全性问题

    youdao

  • An SMS security system development scenarios, including case development source code and database files.

    说明:一个短信防伪系统开发案例包括案例开发程序数据库文件

    youdao

  • In this paper we deal with some security techniques applied to network elective system and the construction of an elective database.

    介绍种可行网上选课系统的规划、流程以及所采取安全技术

    youdao

  • Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.

    然后系统三个难点问题——异常处理安全权限控制异构数据库访问进行了深入的研究。

    youdao

  • Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.

    数据完整性合法存取受到很多方面安全威胁包括密码策略系统后门数据库操作以及本身安全方案

    youdao

  • As the data and information primary storage mode, the security of the database is an important part of accounting information system.

    会计信息系统数据库作为数据信息主要存储方式安全控制问题系统构建的关键

    youdao

  • Among the others, high availability of hospital's network system and high security nature of database are mostly concerned about.

    医院网络系统可用性数据库的高安全性其中最为引人关注的问题。

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • The openness, security, reliability and distributing process of CIMS have been analyzed to meet the requirement of database management System (DBMS) in CIMS.

    针对CIMS环境数据库管理系统(DBMS)需求DBMS开放性、安全可靠性分布式处理进行分析

    youdao

  • NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.

    NET构建了学校信息管理系统本文介绍系统的整体设计数据库访问方法数据安全防范措施

    youdao

  • Starting from MIS system design for chain eatery in this paper, the logic structure design, functional design, database design and security administration of the system is presented in detail.

    餐饮连锁企业MIS系统设计出发,对系统的逻辑结构设计、功能设计、数据库设计系统的安全管理进行了详细的描述和深入的探讨。

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • This thesis also proposes implement strategy and solution scheme of system security problem which every database system can not avoid.

    另外,阐述在任何一个数据库系统中、都不可避免系统安全性问题实施策略解决方案

    youdao

  • Based on the experiment system, a scheme using the digital watermark to protect face information database is proposed, which can increase the security and enrich the content of face images.

    基于系统设计脆弱水印保护人脸图像数据库保存额外信息方案,提高安全性丰富了人脸图像信息内容

    youdao

  • Author take part in this project, and undertook to analyzed the system requirements, the system functions design, database design, the security of the internal network and so on.

    论文作者参加该项工作,承担系统需求分析功能设计数据库设计、安全设计、网站开发后期系统测试工作。

    youdao

  • And it detailedly introduced the design aim, system deploy, system structure, each function module, database and security design.

    详细论述了该模型的设计目标系统部署、系统结构功能模块数据库设计以及安全方案。

    youdao

  • It made information system, from access system to operate database and sign badge, all these things under security control.

    使该所信息系统用户访问系统,操作数据库具体实现签章等工作,处在系统安全控制之下。

    youdao

  • The MIS design is detailed in distributed database design, distributed function design and system security design.

    MIS系统的数据库功能系统安全分布式设计三个方面分别加以阐述

    youdao

  • The integrated model can simplify administration of privileges, and is appropriate for multilevel relation database system which has many users or complex security levels.

    模型方便了管理员权限管理,适合用户较多,安全层次比较复杂多级关系数据库系统

    youdao

  • Using the technologies such as hook, network communication, data encrypting and database, computer operation analyzing and data security managing system has been implemented.

    综合运用系统钩子网络通信数据加密数据库多种技术计算机操作行为分析数据安全管理系统的功能已经基本实现

    youdao

  • Inference control in databases is a key field of multilevel secure database system (MLS-DBS) and is an important means to achieve database security.

    数据库推理控制研究高安全等级的安全数据库系统关键技术之一,是保障数据库安全重要手段

    youdao

  • The thesis also analyses the design plan of system database, including its security, transaction management and ADO data access technology.

    然后,论文论述了系统数据库设计过程,其中包括安全性设计、事务管理设计以及ADO数据访问技术的分析及运用。

    youdao

  • There are two aspects included in database system security, which is access control security strategy and communication channel security.

    数据库系统安全性主要包括两个方面访问控制策略传输通道安全

    youdao

  • System dual-server hot-backup solution is a kind of database security solutions with high capability and high availability.

    数据库服务器双机热解决方案根据用户需求实现数据库安全高性能可靠性解决方案。

    youdao

  • Based on feasibility analyzing and system demand analyzing, emphatically expounds design-project, functional model, interface designing database system designing, security design in this paper.

    可行性研究需求分析基础上,对系统设计方案、功能模块接口设计、数据库系统设计和安全设计等进行了较详细的论述

    youdao

  • Based on feasibility analyzing and system demand analyzing, emphatically expounds design-project, functional model, interface designing database system designing, security design in this paper.

    可行性研究需求分析基础上,对系统设计方案、功能模块接口设计、数据库系统设计和安全设计等进行了较详细的论述

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定