The security attributes of trusted context can be tuned to ensure air-tight access to the database servers.
可以通过调优受信任上下文的安全属性,确保对数据库服务器的无懈可击的访问。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
Security of the database access relies on a JDBC driver and a database implementation.
数据库访问安全依赖于JDBC驱动程序和数据库实现。
By depending on this single point of access, security can be added to RDBMS Web applications before database access.
通过依赖于这个单一访问点,在访问数据库之前,可以为rdbmsWeb应用程序添加安全性。
The lack of a database-level security model makes it difficult to fully leverage ZEO storage servers as clients have more or less unfettered access to the database and must therefore be trusted.
缺乏数据库级别的安全模型使得充分利用ZEO存储服务器变得非常困难,因为客户端或多或少地拥有对数据库的自由访问,因此客户端必须受信任。
DB2 gives fine-grained control over performance and security characteristics of database access-and demands correspondingly careful attention.
DB 2对数据库访问的性能和安全特性施加细粒度的控制—因此需要更细致的处理。
LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.
LBAC是MandatoryAccessControl (MAC)的一个实现,它为存储在数据库中的敏感数据提供了较高级别的安全保障。
As part of the DB2 9.5 database roles enhancement to Label-based access control (LBAC), you might grant or revoke security labels or exemptions to or from a role or a group.
作为对基于标签的访问控制(LBAC)的DB 2 Viper 2数据库角色增强的一部分,可以对一个角色或组授予或收回安全标签或豁免权。
Security is always a concern when you enable Web services access to your database by means of Web services.
当以Web服务的方式访问数据库时,安全性总是一个值得关注的问题。
Access control is the central technology of the security of database.
访问控制是实现数据库安全的核心技术。
The essential security technologies of the distributed database are user authentication and access control.
分布式数据库安全的核心技术是用户身份验证和访问控制。
Application context can be useful for the purposes of enforcing fine-grained access control and enhances the security of database.
通过实际应用来看,应用上下文技术可以用于提高细粒度访问控制的性能,从而提高数据库的安全性。
This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.
文章分析了SYBASE数据库管理系统的安全控制机制和基于角色的数据访问控制模型。
The thesis also analyses the design plan of system database, including its security, transaction management and ADO data access technology.
然后,论文论述了系统数据库的设计过程,其中包括安全性设计、事务管理的设计以及ADO数据访问技术的分析及运用。
This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.
本文介绍了多用户信息系统中数据库的安全性控制的基本概念及控制模型,以及在多用户信息系统中安全性控制的实现方法。
How can we access the database properly is always the key to improves efficiency of application system, enhances security of database and reduces wastage.
合理的使用访问数据库系统,对提高应用系统的效率,增强系统的安全性,减少系统损耗是非常关键的。
Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.
然后,就系统的三个难点问题——异常处理、安全权限控制和异构数据库访问进行了深入的研究。
Improve the rules of comparing the security label, which meet the practical demand of the Access Control for spatial database.
改进了安全级比较的规则,使得更适合现实中空间数据存取控制的需求。
The system encrypts the sensitivity information in database so that there is no access without authentication in order to ensure the security access of the system.
通过调用存储过程对安全数据库进行操作,进而实现系统的安全访问。对数据库表内的敏感信息进行加密存储,未经授权不能访问。
Several popular access technologies are introduced and a primary security model of Web Database is given in the paper.
本文介绍了几种流行的Web数据库访问技术,同时针对Web数据库的安全问题给出了一个初步的安全模型。
The accuracy, consistency and security of database data, as maintained by the RDBMS throughout all user access.
为了满足所有用户访问数据库数据,由关系型数据库管理系统( RDBMS)维护的数据库数据的准确性、一致性和安全性。
Access control security strategy is to preserve the legality of the database users.
访问控制策略即保证数据库的访问者其身份的合法性。
Access control security strategy is to preserve the legality of the database users.
访问控制策略即保证数据库的访问者其身份的合法性。
应用推荐