• 创建LBAC安全策略保护

    Creating tables protected by an LBAC security policy.

    youdao

  • 需要威胁检测规则执行安全策略

    Threat detection rules and security policy enforcement are needed.

    youdao

  • 安全策略附加代理组件

    Attaching the security policy to the proxy component.

    youdao

  • 遵守安全策略条款条件处罚

    Security penalties for not complying with all of the security policy's terms and conditions.

    youdao

  • 如果安全策略要求则对请求进行解密

    Decrypt the request if the security policies dictate it.

    youdao

  • 如果安全策略要求对请求进行加密

    Encrypt the request if the security policies dictate it.

    youdao

  • 安全策略这个1.1里面了改进

    Security policies, which we have improved in 1.1.

    youdao

  • 可以用来检验新的修改安全策略效果

    It can also be used to verify the effect of a new or changed security policy.

    youdao

  • DBSECADM可以像下面这样创建安全策略

    A security policy can be created by DBSECADM as follows.

    youdao

  • 5安全策略提供访问权限角色定义允许操作

    Figure 5: Security Polices provide access, and Roles define Allowed Actions.

    youdao

  • 安全标签组件用于安全策略安全标签构建

    Security label components are the building blocks for security policies and labels.

    youdao

  • 安全策略主要关注用户管理数据保护虚拟保护。

    A cloud security policy focuses on managing users, protecting data, and securing virtual machines.

    youdao

  • 通过适当的、良好定义安全策略可以阻止增加风险

    This increased risk can only be prevented with proper, well-defined security.

    youdao

  • 安全策略分为三类内置自定义高级策略

    Security policies fall into three types: built-in, customized and high-level.

    youdao

  • 安全策略描述一个标准用于决定有权访问特定数据

    A security policy describes the criteria that is used to decide who has access to specific data.

    youdao

  • 有效全面安全策略在攻击探测到时能够有所准备。

    An effective overall security strategy is to be prepared when vulnerabilities are detected.

    youdao

  • 安全策略日志分析报告中心化实现是个不错主义。

    Centralizing the implementation of security policies, log analysis and reporting is a good thing.

    youdao

  • 下图说明用于管理安全策略一种操作策略实施架构风格

    An illustration of an operational policy enforcement architectural style for managing security policy is shown in the figure below.

    youdao

  • 使用服务之前最终用户应该评估服务提供商安全策略

    An end user should evaluate a service provider's security policy before entering into a relationship.

    youdao

  • 安全策略使用非对称加密执行数字签名验证加密解密

    This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.

    youdao

  • 创建安全策略之后安全管理员创建安全策略中的安全标签

    After creating a security policy, the security administrator creates security labels that are part of that policy.

    youdao

  • 公司安全策略决策者可以应用那些规则购买创建授权机构。

    Someone who determines your company's security policy can make those rules and buy or build the issuer.

    youdao

  • 安全策略用于访问控制检查JVM运行时执行的。

    The security policy is used for access control checks, which are performed by the JVM at runtime.

    youdao

  • 相反,时间可以用来设计安全策略目录以及系统标签

    Instead your time can be dedicated to designing security policies, category trees, and the system labels.

    youdao

  • 用户提供扫描功能可以帮助公司达到安全策略的要求。

    Providing users with an on demand scan capability could help your company meet its security strategy.

    youdao

  • 接下来根据安全策略度量资产相关业务风险级别

    Next, measure the level of business risk associated with your assets according to your security policies.

    youdao

  • 数据库安全管理员通过创建安全策略来配置LBAC系统

    The database security administrator configures the LBAC system by creating security policies.

    youdao

  • EJB技术可以任何EJ b组件方法上实施方法安全策略

    However, EJB technology allows method-level security on any EJB component or method.

    youdao

  • 此外功能声明说明安全策略以便多种服务可以参与安全事务通信

    Moreover, the capability declaration notes security policy so that multiple services can participate in a secure transaction communication.

    youdao

  • 或者他们会引用安全策略’或者去解释我们阿拉伯冲突独特性

    Or they cite 'security considerations' or explain the' uniqueness 'of our conflict with the Arabs.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定