• The second type of security policy rules, called disclosure rules, specifies what information can be disclosed in a query result and the conditions under which result objects are disclosed.

    第二安全策略规则类型公开规则,它们指定一个查询结果可以公开哪些信息以及公开结果对象条件

    youdao

  • Exemptions provide a way to allow users to bypass one or more access rules for a security policy.

    豁免权用户绕过安全策略中的多个访问规则提供了一种方式

    youdao

  • The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.

    这个策略范围包括了隐私策略规则安全性策略和规则、交易实施规则。

    youdao

  • Threat detection rules and security policy enforcement are needed.

    需要威胁检测规则执行安全策略

    youdao

  • These rules are usually encoded in a security policy.

    这些规则通常编码安全策略中。

    youdao

  • Someone who determines your company's security policy can make those rules and buy or build the issuer.

    公司安全策略决策者可以应用那些规则购买创建授权机构。

    youdao

  • There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.

    用户可以安全策略创建两种类型规则,从而防止泄露事件数据管理数据。

    youdao

  • Request and response processing rules are created to manipulate the SOAP message as required to conform to the desired security policy.

    创建请求响应处理规则按照要求操作SOAP消息遵循所需安全策略。

    youdao

  • Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    安全策略定义安全标签组成指定控制敏感数据访问规则

    youdao

  • The user will then be prompted to change their password when logging in (that is, if the security password policy rules are enforced).

    如果启用安全密码策略规则用户登录时,提示他们修改密码。

    youdao

  • As the name implies, a PEP is a point in the security architecture where authentication and authorization rules are enforced, based upon the policy defined in the PDP.

    顾名思义PEP安全体系结构基于PD p定义策略执行身份验证授权规则位置

    youdao

  • Use the security Policy Editor to define disclosure rules for the security scenario.

    使用Security PolicyEditor安全场景定义公开规则

    youdao

  • The RFIDIC Security Policy Editor is a tool for specifying the rules under which data can be disclosed by the RFIDIC query interfaces. A user can.

    RFIDICSecurity PolicyEditor一个用来指定安全规则的工具这些规则控制RFIDIC查询接口能够公开哪些数据

    youdao

  • As mentioned before, events are characterized by the two contextual dimensions product and location. Therefore, a user can specify three types of disclosure rules in the Security Policy editor.

    正如前面提到事件按照两个上下文维(产品位置)来区分

    youdao

  • These authorized rules have considered the user attribute and the enterprise security policy.

    这些授权规则考虑用户属性企业安全策略

    youdao

  • It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.

    统一描述策略元素安全规则支持多种访问控制模型体现良好通用性

    youdao

  • Security policy is the configurable set of rules that the common language runtime follows when determining the permissions to grant to code.

    安全策略公共语言运行确定授予代码权限遵循可配置一组规则

    youdao

  • Security policy is the configurable set of rules that the common language runtime follows when determining the permissions to grant to code.

    安全策略公共语言运行确定授予代码权限遵循可配置一组规则

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定