The system is compatible with Mercury Security access control panels.
该系统与水银的安全访问控制面板兼容。
File security access control is the core of the bank automatic teller machine security.
文件安全访问控制,是银行自动柜员机安全的核心部分。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.
主要介绍网络安全准入控制系统组成及相关技术,并对该技术在铁路信息系统中如何应用加以探讨。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
The system must provide security and control access to those functions based on permissions.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Some file systems support advanced security features, such as access control lists (ACLs).
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
Rules for access control are configured as Security Rules.
访问控制规则被配置为安全规则。
Pulling together information from a variety of sources also carries with it security concerns, including access control.
将多种来源的信息整合在一起将会带来包括访问控制在内的安全性问题。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Security administrators can control access to their databases at a level of abstraction that is close to the structure of their organizations.
安全管理员可以在接近于组织结构的抽象层次上控制对数据库的访问。
If access to projects is a concern, then you can create security policies that control access to certain groups.
如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。
When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.
当配置服务在服务器外运行时,并没有对其实施访问控制,因为管理安全基础结构是在服务器内运行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
The security policy is used for access control checks, which are performed by the JVM at runtime.
安全策略用于访问控制检查,这是由JVM在运行时执行的。
Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.
文档控制和安全:目的是为了管理以业务为主的信息的访问以及使用数字签名验证文档的真实性。
This article addresses the problem of application-level security by breaking access into two manageable units: Workbench - and Control-level access.
本文通过将访问权集成到两个可管理单元(工作台级访问和控件级访问)的方式,解决了应用程序级的安全性问题。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.
DB 2提供了基于标签的访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性。
Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
Records Management Services manage the retention, access control and security, auditing and reporting, and ultimate disposition of business records.
RecordsManagementServices管理业务记录的保存、访问控制和安全性、审计和报告以及最终处置。
The hosting PaaS itself can be hardened as a box (appliance) with a web-based administration console exposed as solely an access portal for security control and client-side customization submissions.
主机PaaS自身可以固化为一个盒子(设备),带有单纯作为安全控制和客户端定制提交访问门户输出的基于 web 的管理控制台。
The hosting PaaS itself can be hardened as a box (appliance) with a web-based administration console exposed as solely an access portal for security control and client-side customization submissions.
主机PaaS自身可以固化为一个盒子(设备),带有单纯作为安全控制和客户端定制提交访问门户输出的基于 web 的管理控制台。
应用推荐