This paper first introduces the concepts of data warehouse and problems of access security. It then introduces a tax data warehouse, focusing on the measures taken to ensure security of access to it.
本文首先介绍了一些数据仓库的概念与访问安全方面的问题,然后重点介绍了我们建立的税务数据仓库在访问方面采取的安全措施。
There will be several different security domains, each of which have different access controls and restrictions.
存在几种不同的安全领域,每个领域都有不同的访问控制和限制。
The kernel usually has some sort of security model that manages access to devices, files, processes, and objects.
内核通常具有某种类型的安全模式来管理对设备、文件、进程和对象的访问。
Another common trend is the application of service gateway patterns to provide enhanced access security for service endpoints.
另一个常见的趋势是,应用服务网关模式来为服务端点提供增强的访问安全。
Portal security controls the level of access to all the portal resources, including content.
门户安全性控制所有门户资源(包括内容)的访问级别。
Another important aspect of global variables is that when security of the information is an issue, controlling access is possible.
全局变量的另一重要方面是,当考虑到信息安全问题时,可以控制对信息的访问。
Thus, management retains control over who can access each specific set of models, which prevents potential security violations.
因此,管理保留了对访问模型特定集合的控制权,这就阻止了潜在的安全性入侵。
They want to balance the desire to be on the front edge of access to the Indian market, with the collateral impact of compromising user security.
他们希望平衡在印度电信市场中保持强劲竞争力的需求,及为了进入这个市场而必要的在用户通讯安全性方面的牺牲。
It is generally a fairly coarse-grained form of security that deals with access to functional areas of the system, perhaps defined by URLs or method calls on an EJB component.
总的说来,这是一种非常粗粒度的安全形式,用于处理对系统的功能领域的访问,可以由url或对EJB组件的方法调用进行定义。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
The security attributes of trusted context can be tuned to ensure air-tight access to the database servers.
可以通过调优受信任上下文的安全属性,确保对数据库服务器的无懈可击的访问。
Pulling together information from a variety of sources also carries with it security concerns, including access control.
将多种来源的信息整合在一起将会带来包括访问控制在内的安全性问题。
Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more.
信息管理是一个庞大的主题,可涉及到有关内容管理策略、分布式访问、联合安全性等的讨论。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
To assess the status of food security - i.e. access to food, food availability and food utilization - in South Africa.
旨在评估南非的食品保障状况,即食品获取、食品供应和食品利用情况。
Another important aspect of global variables is that where security of the information is an issue, controlling access is possible.
全局变量的另一重要方面是,在考虑到信息安全性时,可以对访问进行控制。
IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.
IDSLBACREADSET:要访问数据,用户安全标签的每个集合组件必须包括数据安全标签的集合组件。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
Security of the database access relies on a JDBC driver and a database implementation.
数据库访问安全依赖于JDBC驱动程序和数据库实现。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
IDSLBACREADARRAY: Each array component of the user security label must be greater than or equal to the array component of the data security label to allow access to data.
IDSLBACREADARRAY:要访问数据,用户安全标签的每个数组组件必须大于或等于数据安全标签的数组组件。
IDSLBACWRITEARRAY: Each array component of the user security label must be equal to the array component of the data security label to allow access to data.
IDSLBACWRITEARRAY:要访问数据,用户安全标签的每个数组组件必须等于数据安全标签的数组组件。
This article addresses the problem of application-level security by breaking access into two manageable units: Workbench - and Control-level access.
本文通过将访问权集成到两个可管理单元(工作台级访问和控件级访问)的方式,解决了应用程序级的安全性问题。
While suid and sgid are handy, and even necessary in many circumstances, improper use of these access mode can allow breaches of a system's security.
虽然suid和sgid很便利,甚至在很多环境下是必需的,但是这些访问模式不适当的使用会造成系统安全上的漏洞。
Security and management: Provides a single point of control, access, and validation of web service requests.
安全和管理:提供Web服务请求的单点控制、访问和验证。
Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.
WebSphereApplicationServer的安全基础结构,比如基于角色的访问控制和加密。
The cumulative way that access is granted explains why the RACF implementation of security for queues does not allow get and put access to be granted independently.
以累加的方式授予访问权限解释了为什么队列的RACF安全实现不允许单独授予get和put 访问权限。
Everything is now working, but because of security requirements, you can access only the server from which you downloaded the applet.
现在万事俱备,但是因为安全性要求,您只能访问下载applet的服务器。
By depending on this single point of access, security can be added to RDBMS Web applications before database access.
通过依赖于这个单一访问点,在访问数据库之前,可以为rdbmsWeb应用程序添加安全性。
应用推荐