The name of the protected data section.
受保护的数据节的名称。
They are granted to users to allow them access to protected data.
可以将安全标签授给用户,允许他们访问受保护的数据。
Protected data can be recovered later if you know the remote control code.
受保护的数据可以恢复后,如果你知道远程控制代码。
And protected data can be recovered later if you know the remote control code.
和受保护的数据可以恢复后,如果你知道远程控制代码。
For our simple purposes, a recoverable action is anything that modifies protected data.
简单地,可恢复的动作是修改被保护数据的任何事情。
The security administrator allows users access to protected data by granting them security labels.
安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
The database security administrator allows users access to protected data by granting them security labels.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
Direct ownership is a very common form of instance-based relationship between a user and some protected data.
直接所有权是用户和某些受保护数据间的一种十分常见的基于实例的关系。
An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing.
豁免权使用户可以访问其安全标签不允许其访问的受保护数据。
When a user tries to access protected data, his security label is compared to the security label that is protecting the data.
当一个用户试图访问受保护的数据时,必须将他的安全标签与保护数据的安全标签进行比较。
When a user tries to access protected data, that user's security label is compared to the security label protecting the data.
当一个用户试图访问受保护的数据时,该用户的安全标签将与用于保护该数据的安全标签相比较。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.
豁免权使原本安全标签权限不足的用户可以访问受保护数据。
To access protected data in a change management system such as Rational Team Concert, you typically must furnish a user name and password.
为了访问RationalTeamConcert之类变更管理系统中受保护的数据,通过重复使用已存在的标准您必须能够完善用户名字和密码。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
These instructions can make quick work of the task of making sure protected data can only be accessed by authorized entities on your Linux system.
这些指示可以快速确保受保护的数据只能由Linux系统上已授权的实体访问。
The shortcoming in focusing on such sturdy digital walls is that once they are evaded, the attacker has access to all the protected data behind them.
关注加固数字墙的缺点是一旦他们被绕过,攻击者就已获得了所有受保护的数据。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.
安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
When a mashup application integrates protected data sources or services acquired from another vendor, credentials are required to access these systems.
当mashup应用程序集成受保护的数据源或从其他供应商获得的服务时,若要访问这些系统,需提供凭证。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
Many tasks break down into two distinct types of work, however: tasks that only need to read the protected data structures and those that must make changes.
因此,就必然会产生两种截然不同的任务:对保护数据结构体读取的任务和更改结构体的任务。
The three key technologies of tobacco toasting autocontrol system are to be realized stably temperature collecting, to be protected data after turn-off, and real time clock function.
烟叶烘烤自动控制系统的三大核心技术是实现稳定的温度采集、掉电保护、实时时钟功能。
However, the way you solve the problem differs when you are thinking functionally. Consider the example in Listing 3 (taken from a larger codebase) of a method that does protected data access.
然而,如果您有函数式思维,问题的解决方法会有所不同。
These keysets provide read and write access to the data protected by their keys.
这些键集通过它们的键,提供了对保护数据的读写权限。
The data protected by these locks is needed constantly by many threads, and you can expect that when you go to acquire this lock, you may have to wait until someone else is done with it.
不断地会有许多线程需要这些锁保护的数据,所以可以想象,当要取得这个锁的时候,可能不得不等候其他人用完它。
In future, cloud providers will offer many more options for where data are kept and how they are protected.
未来,云服务的提供上门将提供更多数据存储地点和保护方式的选择。
Traditionally, data has skulked about, protected and doled out carefully by its handlers, or has hidden from view, wearing dark sunglasses, mingling among the commoners of the Web.
在传统上,数据由其管理者小心地隐藏、保护和公开,或者隐藏在公众视线以外,披上了层层伪装,或者淹没在网络海洋之中。
It is important that this data is correctly protected from the competing requirements of those transactions that require read access, and those that require update access.
在请求读访问和请求更新访问的事务之间产生冲突时,数据能否得到正确的保护是十分重要的。
Locking should ensure both that per-CPU data structures and state are always protected against preemption.
锁定可以确保每个CPU的数据结构和状态始终受到保护而不被抢占。
That data must be captured accurately, governed, protected, and held confidential.
数据必须予以精确捕获、治理、保护、以及进行保密。
That data must be captured accurately, governed, protected, and held confidential.
数据必须予以精确捕获、治理、保护、以及进行保密。
应用推荐