The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.
TCS要求控制关键系统资源的分配和释放,包括数据库记录、通信套接字、安全密钥,等等。
This article explains what the plug-in writer or database administrator should test before deploying the customized security plug-ins to the DB2 system.
本文阐述了将定制的安全性插件部署到DB 2系统前,插件编写人员或数据库管理人员应该测试的内容。
System management: data management, data warehouse security, system and database backup and recovery, and so on.
系统管理:数据管理、数据仓库安全性、系统和数据库的备份和恢复,等等。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
Note that a database administrator or system administrator does not possess the database security administrator authority by default.
注意,默认情况下数据库管理员或系统管理员并不拥有数据库安全管理员权限。
Along with this database, the te implements security policies that add another level to system security.
除了这个数据库以外,TE还实现了安全策略,从而增添了另一个级别的系统安全性。
The database security administrator configures the LBAC system by creating security policies.
数据库安全管理员通过创建安全策略来配置LBAC系统。
It is capable of logging database events such as authorization checking, database object maintenance, security maintenance, system administration, and user validation.
它可以对一些数据库事件,例如授权检查、数据库对象维护、安全性维护、系统管理和用户验证等做日志记录。
Security considerations when connecting to a database from a client system to a server system.
客户机系统通过服务器系统连接到数据库时的安全性考虑。
Computer system and network security are basis of security of distributed database system.
计算机系统和网络的安全是分布式数据库系统安全的基础。
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
Prior to 2003, the domestic database encryption means through the compilation of foreign security database system.
在2003年之前,国内的数据库加密手段是通过反编译国外安全数据库系统完成的。
An SMS security system development scenarios, including case development source code and database files.
说明:一个短信防伪系统的开发案例,包括案例开发源程序及数据库文件。
In this paper we deal with some security techniques applied to network elective system and the construction of an elective database.
介绍了一种可行的网上选课系统的规划、流程以及所采取的安全技术。
Interface design influences the security of whole system in database application development.
数据库应用开发中接口设计影响整个系统的安全性。
Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.
然后,就系统的三个难点问题——异常处理、安全权限控制和异构数据库访问进行了深入的研究。
Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.
数据完整性和合法存取会受到很多方面的安全威胁,包括密码策略、系统后门、数据库操作以及本身的安全方案。
As the data and information primary storage mode, the security of the database is an important part of accounting information system.
在会计信息系统中,数据库作为数据和信息的主要存储方式,其安全控制问题是系统构建的关键。
System security is one of the chief problems in large-scale database design.
系统安全是大型数据库系统设计中的一个重要问题。
Author take part in this project, and undertook to analyzed the system requirements, the system functions design, database design, the security of the internal network and so on.
论文作者参加了该项工作,承担了系统需求分析、功能设计、数据库设计、安全设计、网站开发及后期系统测试工作。
Among the others, high availability of hospital's network system and high security nature of database are mostly concerned about.
医院网络系统的高可用性和数据库的高安全性是其中最为引人关注的问题。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
Integrity is one of the objectives related to information system security, this paper presents a model to specify integrity policies for temporal database management system.
数据完整性是信息系统的安全目标之一,该文描述了一个时间相关的数据库管理系统的完整性策略模型。
The MIS design is detailed in distributed database design, distributed function design and system security design.
从MIS系统的数据库、功能、系统安全分布式设计三个方面分别加以阐述。
The integrated model can simplify administration of privileges, and is appropriate for multilevel relation database system which has many users or complex security levels.
该模型方便了管理员的权限管理,适合用户较多,安全层次比较复杂的多级关系数据库系统。
It is impossible to modify the business database products, according to the realization, database security proxy is put forward to enhance the security of database application system.
由于不可能对商用数据库产品进行修改,从应用实际出发,提出由数据库安全代理增强数据库应用系统的安全性。
NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.
NET构建了学校信息管理系统,本文介绍了系统的整体设计,数据库访问方法和数据安全防范措施。
This paper introduces the basis of implementation, database design, security design, interface design etc for the booking system of physical experiments on the network.
介绍了物理实验网上预约系统的实现基础、数据库设计、安全性设计、界面设计等。
Starting from MIS system design for chain eatery in this paper, the logic structure design, functional design, database design and security administration of the system is presented in detail.
从餐饮连锁企业的MIS系统设计出发,对系统的逻辑结构设计、功能设计、数据库设计及系统的安全管理进行了详细的描述和深入的探讨。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
应用推荐