创建受LBAC安全策略保护的表。
需要有威胁检测规则并执行安全策略。
Threat detection rules and security policy enforcement are needed.
将安全策略附加到代理组件。
对不遵守安全策略的条款和条件的处罚。
Security penalties for not complying with all of the security policy's terms and conditions.
如果安全策略要求,则对请求进行解密。
如果安全策略要求,则对请求进行加密。
安全策略,这个在1.1里面有了改进。
它还可以用来检验新的或修改的安全策略的效果。
It can also be used to verify the effect of a new or changed security policy.
DBSECADM可以像下面这样创建安全策略。
图5:安全策略提供访问权限,角色定义允许操作。
Figure 5: Security Polices provide access, and Roles define Allowed Actions.
安全标签组件是用于安全策略和安全标签的构建块。
Security label components are the building blocks for security policies and labels.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
通过适当的、良好定义的安全策略可以阻止增加的风险。
This increased risk can only be prevented with proper, well-defined security.
安全策略分为三类:内置、自定义和高级策略。
Security policies fall into three types: built-in, customized and high-level.
安全策略描述一个标准,用于决定谁有权访问特定的数据。
A security policy describes the criteria that is used to decide who has access to specific data.
有效且全面的安全策略是在攻击被探测到时能够有所准备。
An effective overall security strategy is to be prepared when vulnerabilities are detected.
安全策略、日志分析与报告的中心化实现是个不错的主义。
Centralizing the implementation of security policies, log analysis and reporting is a good thing.
下图说明用于管理安全策略的一种操作策略实施架构风格。
An illustration of an operational policy enforcement architectural style for managing security policy is shown in the figure below.
在使用服务之前,最终用户应该评估服务提供商的安全策略。
An end user should evaluate a service provider's security policy before entering into a relationship.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
创建安全策略之后,安全管理员将创建安全策略中的安全标签。
After creating a security policy, the security administrator creates security labels that are part of that policy.
公司安全策略决策者可以应用那些规则并可购买或创建授权机构。
Someone who determines your company's security policy can make those rules and buy or build the issuer.
安全策略用于访问控制检查,这是由JVM在运行时执行的。
The security policy is used for access control checks, which are performed by the JVM at runtime.
相反,你的时间可以用来设计安全策略,目录树,以及系统标签。
Instead your time can be dedicated to designing security policies, category trees, and the system labels.
向用户提供按需扫描功能可以帮助您的公司达到其安全策略的要求。
Providing users with an on demand scan capability could help your company meet its security strategy.
接下来,根据您的安全策略,度量与您的资产相关的业务风险级别。
Next, measure the level of business risk associated with your assets according to your security policies.
数据库安全管理员通过创建安全策略来配置LBAC系统。
The database security administrator configures the LBAC system by creating security policies.
EJB技术可以在任何EJ b组件或方法上实施方法级的安全策略。
However, EJB technology allows method-level security on any EJB component or method.
此外,功能声明说明了安全策略,以便多种服务可以参与安全事务通信。
Moreover, the capability declaration notes security policy so that multiple services can participate in a secure transaction communication.
或者他们会引用‘安全策略’或者去解释我们与阿拉伯人冲突的独特性。
Or they cite 'security considerations' or explain the' uniqueness 'of our conflict with the Arabs.
应用推荐