• Use LBAC to control data access.

    使用LBAC控制数据访问

    youdao

  • Creating an LBAC security policy.

    创建LBAC安全策略

    youdao

  • LBAC read access rules are enforced while reading from source table, however.

    然而,在读取数据期间LBAC读取访问规则执行

    youdao

  • DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.

    DB 2提供基于标签访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性

    youdao

  • LBAC is very configurable and you can tailor it to match your particular security environment.

    LBAC容易配置可以进行定制满足特定安全环境

    youdao

  • LBAC is very configurable and you can tailor it to match your particular security environment.

    LBAC容易配置可以进行定制满足特定安全环境

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定