In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
It is important that this data is correctly protected from the competing requirements of those transactions that require read access, and those that require update access.
在请求读访问和请求更新访问的事务之间产生冲突时,数据能否得到正确的保护是十分重要的。
Data in a table can only be protected by security labels that are part of the security policy protecting the table.
一个表中的数据只能受到保护该表的安全策略的安全标签的保护。
Traditionally, data has skulked about, protected and doled out carefully by its handlers, or has hidden from view, wearing dark sunglasses, mingling among the commoners of the Web.
在传统上,数据由其管理者小心地隐藏、保护和公开,或者隐藏在公众视线以外,披上了层层伪装,或者淹没在网络海洋之中。
LotusScript is designed to be thread-safe, which means it USES semaphores to protect data structures so that each loaded instance of LotusScript is protected.
LotusScript被设计为线程安全的,这意味着它使用信号量保护数据结构,从而保护装载的每个LotusScript实例。
These instructions can make quick work of the task of making sure protected data can only be accessed by authorized entities on your Linux system.
这些指示可以快速确保受保护的数据只能由Linux系统上已授权的实体访问。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
Direct ownership is a very common form of instance-based relationship between a user and some protected data.
直接所有权是用户和某些受保护数据间的一种十分常见的基于实例的关系。
Valuable data assets reside in nonvolatile memory so they are protected against the loss of electrical power - regardless of whether the loss is deliberate.
有价值的数据驻留在非易失性存储器中,以免因为断电而丢失—不管这种断电是有意还是无意。
As a result, more and more data are seeping out of companies, even of the sort that should be well protected.
种种原因共同作用的结果是,越来越多的企业信息泄露,包括那些本来应该妥善保密的。
The cache must be nonvolatile to ensure that log data is protected in the event of a catastrophic failure, such as loss of power.
高速缓存必须是非易失的以确保在发生灾难性故障(例如停电)时保护日志数据。
Of course, since the code segment is write protected, the data in the code segment can only be constant.
当然,由于代码段是写保护的,所以代码段中的数据只能是常数。
The intellectualized equipment is the point of research in the world, it mainly uses microprocessor to dispose, restore and compare the collecting data so as to achieve the protected function.
智能化电器是目前国内外研究的热点,主要采用微处理器对采集的数据进行处理、存储和比较,实现模块化的保护功能。
As our sister blog Threat Level has reported, a patchwork of inconsistent recent court rulings has yet to resolve whether geolocation data is protected by the Fourth Amendment.
我们的姐妹博客“威胁等级”(Threat Level)同样报道说,一份对于各种互相矛盾的法院条令的修订案将会裁定地理位置数据是否受到第四修正案(the Fourth Amendment)的保护。
However, the way you solve the problem differs when you are thinking functionally. Consider the example in Listing 3 (taken from a larger codebase) of a method that does protected data access.
然而,如果您有函数式思维,问题的解决方法会有所不同。
Kuka said that its industrial property rights and the data of its customers and suppliers would be protected by the agreement and that Midea would not be able to gain access to or move databases.
库卡表示,其工业知识产权,以及其客户和供应商数据可以通过协议得到保护,美的无法访问或移动数据库。
The high speed data cipher card can implement the information storage and transmit the protected information, which has the function of digital signature and signature authentication.
高速数据密码卡可以实现信息的存储和对传输信息的加解密保护、数字签名和签名验证功能。
GPRS system and service data can be separated and protected through VPN, ensuring the safety of GPRS network and service.
用VPN可以对各种GPRS系统和业务数据进行合理的分离和保护,保证GPRS网络和业务的安全。
Many tasks break down into two distinct types of work, however: tasks that only need to read the protected data structures and those that must make changes.
因此,就必然会产生两种截然不同的任务:对保护数据结构体读取的任务和更改结构体的任务。
The name of the protected data section.
受保护的数据节的名称。
Also, the hardware virtual memory mechanisms allow areas of memory to be protected against writing. This protects code and data from being overwritten by rogue applications.
另外,硬件虚存机制可以对内存部分区域提供写保护,以防止代码和数据被其它恶意的应用程序所篡改。
The three key technologies of tobacco toasting autocontrol system are to be realized stably temperature collecting, to be protected data after turn-off, and real time clock function.
烟叶烘烤自动控制系统的三大核心技术是实现稳定的温度采集、掉电保护、实时时钟功能。
Because the data in database is kept under specified terms, for the moment, data in most of database are not protected by encrypting form, but by using these outside methods.
这是因为数据库内部的数据是以明文的方式保留的,目前大多数的数据库都还没有使用数据库加密这一方式来维护其内部数据,而只是依靠于这些外部手腕。
Now through the use of this software, I can put my data protected.
现在通过用这款软件,我可以把我的资料保护起来。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
The basic authority and the HTTP authority provide access control strategy of the protected resources. The SSL provides mechanism for transmitting sensitive encrypted data.
基本认证和HTTP认证提供了对受保护资源的访问控制策略,而SSL则提供对敏感数据加密传输的机制。
While corporate and personal data can be protected through data encryption, effective retrieval of encrypted data is difficult to achieve by traditional means.
通过对数据进行加密可以保护企业及个人用户的数据隐私。
While corporate and personal data can be protected through data encryption, effective retrieval of encrypted data is difficult to achieve by traditional means.
通过对数据进行加密可以保护企业及个人用户的数据隐私。
应用推荐