Use LBAC to control data access.
使用LBAC来控制数据访问。
Creating an LBAC security policy.
创建LBAC安全策略。
Creating tables protected by an LBAC security policy.
创建受LBAC安全策略保护的表。
LBAC security cannot be imposed on external table data files.
LBAC安全性不能施加在外部表数据文件上。
Together, the security labels and exemptions are called LBAC credentials.
安全标签和豁免权统称为 LBAC凭证。
A new and exciting feature in DB2 9 is Label Based Access Control (LBAC).
DB 29中一个新的、令人激动的特性是基于标签的访问控制(Label Based Access Control,LBAC)。
The formal representation and scheduling algorithm of LBAC are illustrated.
文章给出了LBAC的形式化表示及其调度算法。
Following are different ways the merge statement can be used on LBAC tables.
以下是在lbac表上使用merge语句的不同方法。
LBAC read access rules are enforced while reading from source table, however.
然而,在从源表读取数据期间,LBAC读取访问规则被执行。
The merge statement can be applied on label-based access control (LBAC) tables.
merge语句可被应用到基于标签的访问控制(LBAC)表中。
As a best practice, consider using LBAC as a way to control access to sensitive data.
作为一项最佳实践,应考虑使用LBAC作为控制对敏感数据的访问的一种方法。
LBAC read access rules are enforced while reading from both source and target tables.
在从源表及目标表读取数据的过程中,LBAC读取访问规则被执行。
DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.
DB 2提供了基于标签的访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性。
The database security administrator configures the LBAC system by creating security policies.
数据库安全管理员通过创建安全策略来配置LBAC系统。
A user's LBAC credentials are any security labels he holds plus any exemptions that he holds.
用户的LBAC凭证是他所持有的安全标签和豁免权。
LBAC is very configurable and you can tailor it to match your particular security environment.
LBAC很容易配置,您可以对它进行定制,以满足特定的安全环境。
Lesson 1: use case and setup - Creates users, the LBAC policy, and the protected table containing XML.
第1课:用例和设置——创建用户、LBAC策略和包含X ML的受保护表。
It is not known, and indeed the process of housing construction in the LBAC on pollution problems exist.
可不为人所知的是,实际上房屋在土建施工过程就存在着污染隐患。
In this article, you've explored how you can use the IDS LBAC feature to deploy fine-tuned policy controls.
在本文中,您探索了如何使用IDSlbac特性来部署经过精确调优的策略控制。
The LBAC capability is configurable and can be tailored to match the user's particular security environment.
LBAC 的功能是可配置的,因此可以对其进行定制,满足用户特定的安全环境。
The IDS implementation of LBAC allows control over who can access data in individual rows and columns of a table.
IDS中的 LBAC实现允许控制谁可以访问一个表中个别行和列中的数据。
EasyOA further leverages LBAC to implement DBMS level security, so as to prevent invalid data access among tenants.
EasyOA还利用LBAC实现dbms级安全性以防止租户之间的非法数据访问。
LBAC lets you decide exactly who has write access and who has read access to individual rows and individual columns.
LBAC使您可以决定谁拥有不同行和列上的写访问权限,谁拥有读访问权限。
LBAC lets users decide exactly who has write access and who has read access to individual rows and individual columns.
LBAC让用户定义确切地定义哪些人有对某行和列的写访问权,哪些人又有读访问权。
A database security administrator, a user to whom the new DBSECADM role has been granted, performs all LBAC configurations.
数据库安全管理员(被授予新的DBSECADM角色的用户)执行所有LBAC配置。
Label-based access control (LBAC), which provides new ways of controlling access to the sensitive data within the database.
基于标签的访问控制(LBAC),这为数据库中的敏感数据提供新的访问控制方法。
The LBAC feature provides for greater granularity for controlling read and write access to individual rows and table columns.
LBAC特性为控制对各行和各列的读写访问提供了更细的粒度。
Includes the Advanced access control Feature (ACCF) enabling cell -, column - and row-level label-based access control (LBAC).
内含启用资料格层次、栏层次与列层次标签型存取控制(LBAC)的“进阶存取控制功能”(ACCF)。
The second level of access control is Label-Based access control (LBAC), which can be at the row level, column level, or both.
第二级的访问控制是基于标签的访问控制(Label - Based Access Control,LBAC),这种控制可以发生在行级、列级或者同时发生在这两级。
The Advanced Access Control Feature implements label-based access control (LBAC) to offer row-level and column-level protection.
AdvancedAccessControlFeature实现了基于标签的访问控制(LBAC),以提供行级和列级保护。
应用推荐