The second type of security policy rules, called disclosure rules, specifies what information can be disclosed in a query result and the conditions under which result objects are disclosed.
第二种安全策略规则类型是公开规则,它们指定在一个查询结果中可以公开哪些信息,以及公开结果对象的条件。
Exemptions provide a way to allow users to bypass one or more access rules for a security policy.
豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。
The scope of the policy covers privacy policies and rules, security policies and rules, transactional and enforcement rules.
这个策略的范围包括了隐私策略和规则,安全性策略和规则、交易和实施规则。
Threat detection rules and security policy enforcement are needed.
需要有威胁检测规则并执行安全策略。
These rules are usually encoded in a security policy.
这些规则通常编码在安全策略中。
Someone who determines your company's security policy can make those rules and buy or build the issuer.
公司安全策略决策者可以应用那些规则并可购买或创建授权机构。
There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.
用户可以在安全策略中创建两种类型的规则,从而防止泄露事件数据和管理数据。
Request and response processing rules are created to manipulate the SOAP message as required to conform to the desired security policy.
将创建请求和响应处理规则来按照要求操作SOAP消息,以遵循所需的安全策略。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
The user will then be prompted to change their password when logging in (that is, if the security password policy rules are enforced).
如果启用了安全密码策略规则,当用户登录时,会提示他们修改密码。
As the name implies, a PEP is a point in the security architecture where authentication and authorization rules are enforced, based upon the policy defined in the PDP.
顾名思义,PEP是安全体系结构中基于PD p中定义的策略执行身份验证和授权规则的位置。
Use the security Policy Editor to define disclosure rules for the security scenario.
使用Security PolicyEditor为安全场景定义公开规则。
The RFIDIC Security Policy Editor is a tool for specifying the rules under which data can be disclosed by the RFIDIC query interfaces. A user can.
RFIDICSecurity PolicyEditor是一个用来指定安全规则的工具,这些规则控制RFIDIC查询接口能够公开哪些数据。
As mentioned before, events are characterized by the two contextual dimensions product and location. Therefore, a user can specify three types of disclosure rules in the Security Policy editor.
正如前面提到的,事件按照两个上下文维(产品和位置)来区分。
These authorized rules have considered the user attribute and the enterprise security policy.
这些授权规则考虑了用户属性和企业安全策略。
It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.
统一描述策略元素和安全规则,支持多种访问控制模型,体现了良好的通用性。
Security policy is the configurable set of rules that the common language runtime follows when determining the permissions to grant to code.
安全策略是公共语言运行时在确定要授予代码的权限时遵循的可配置的一组规则。
Security policy is the configurable set of rules that the common language runtime follows when determining the permissions to grant to code.
安全策略是公共语言运行时在确定要授予代码的权限时遵循的可配置的一组规则。
应用推荐