Use LBAC to control data access.
使用LBAC来控制数据访问。
Creating an LBAC security policy.
创建LBAC安全策略。
LBAC read access rules are enforced while reading from source table, however.
然而,在从源表读取数据期间,LBAC读取访问规则被执行。
DB2 further extends security by offering a Label Based Access Control (LBAC) mechanism.
DB 2提供了基于标签的访问控制(Label Based Access Control,LBAC)机制,从而进一步扩展了安全性。
LBAC is very configurable and you can tailor it to match your particular security environment.
LBAC很容易配置,您可以对它进行定制,以满足特定的安全环境。
LBAC is very configurable and you can tailor it to match your particular security environment.
LBAC很容易配置,您可以对它进行定制,以满足特定的安全环境。
应用推荐