Using the account manager, you add intraverse secure domain user account to the security database.
向导已成功将现有用户帐号导出至用户帐号文件中。
The LDAP database is loaded with the user and group information from the localhost's security database files.
使用本地主机的安全数据库文件中的用户和组信息装载ldap数据库。
On the base of these, a security database architecture whose secure level is not less than B1 is designed.
并在此基础上设计出了一种安全级别至少为B1的安全数据库体系结构。
The security database on the server does not have a computer account for this workstation trust relationship.
通信器无法复制目录,因为服务器的更改运行记录信息不完整。
In makes an applied multi-level relation model to be basement of security database for following the BLP model.
为了适应BLP模型,采用一种实用的多级关系 模型作为安全数据库的基础,这是原有 关系 模型的扩展。
Prior to 2003, the domestic database encryption means through the compilation of foreign security database system.
在2003年之前,国内的数据库加密手段是通过反编译国外安全数据库系统完成的。
It maintain the security database which list all the valid user, group, and organization that comprise the secure domain.
它维护安全数据库,该数据库中列出了所有有效用户、组和包含安全域的组织。
In this paper, we proposed a formal security database system access model including a multilevel relation model and a element-level authorization.
提出了一个安全数据库访问控制模型,包括一个多层关系模型和一个用以增强自主访问控制能力的元素级粒度的授权。
The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.
安全数据库管理系统的安全策略可以为数据库提供强大的安全功能,现在BLP模型是用得比较普遍的策略模型之一。
But because of national security policy, which is disguised as database encryption products are not popular in the domestic market of domestic security database, but gradually disappeared.
但由于国家保密政策的限制,这些被伪装成国产的数据库加密产品并没有在国内数据库安全市场大行其道,反而逐渐销声匿迹。
This paper analyzes and summarizes many classical multilevel security database models, comparing their advantages and disadvantages in detail as well as the availability under different semantics.
本文对众多经典的多级安全数据库模型进行分析总结,详细比较了其优缺点和不同语义下模型的可用性。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data.
安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
For example, discovering services by criteria such as "number of supported database entries" or "security level" could be supported.
例如,可能会支持按某些条件(如“支持的数据库条目数量”或“安全性级别”等)发现服务。
System management: data management, data warehouse security, system and database backup and recovery, and so on.
系统管理:数据管理、数据仓库安全性、系统和数据库的备份和恢复,等等。
The result of all this is clear: providing effective database security and compliance has become anything but easy.
这些趋势的结果是:提供有效的数据库安全性和遵从性越来越困难了。
To enable this configuration, you must disable database privacy and security for the local DCI.
为了激活这个配置,您必须关闭数据库对本地dci的安全性。
You can also specify security Settings and database configuration options within the installation and configuration wizards.
您还可以在安装和配置向导内指定安全设置和数据库配置。
Data sources can be configured to use integrated security so that database connections are made using the current user's account.
可以配置数据源使用集成的安全性,以便可以使用当前的用户帐户进行数据库连接。
Note that a database administrator or system administrator does not possess the database security administrator authority by default.
注意,默认情况下数据库管理员或系统管理员并不拥有数据库安全管理员权限。
Role membership is managed by the database security administrator.
角色从属关系由数据库安全管理员来管理。
Many of these security aspects are known to a database administrator.
其中许多安全性方面对于数据库管理员是已知的。
The database security administrator can optionally delegate this ability to others when the role membership is granted.
在授予角色从属关系时,数据库安全管理员可以选择将这项能力授权给其他人。
There are several more roles in a typical it organization, including infrastructure support, database support, security, and so on.
在典型的IT组织中还包括多个其他角色,包括基础设施支持、数据库支持、安全性等等。
The database security administrator allows users access to protected data by granting them security labels.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
DB2 gives fine-grained control over performance and security characteristics of database access-and demands correspondingly careful attention.
DB 2对数据库访问的性能和安全特性施加细粒度的控制—因此需要更细致的处理。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
Database-level security measures including authentication and authorization might also be used to enhance application security.
数据库级的安全措施,包括身份验证和授权,也可以用于加强应用程序的安全性。
The database security administrator configures the LBAC system by creating security policies.
数据库安全管理员通过创建安全策略来配置LBAC系统。
Security of the database access relies on a JDBC driver and a database implementation.
数据库访问安全依赖于JDBC驱动程序和数据库实现。
After you select the database, select the security file to import, as shown in Figure 16.
选择数据库后,选择要导出的安全文件,如图16所示。
应用推荐