实验表明,该方案能够有效对飞行数据进行加密存储,在飞行数据安全管理方面得到了很好的应用。
The experiments show that the encryption scheme above can encrypt the flight data efficiently, and it will be primely applied in the flight data storage and management.
综合运用系统钩子、网络通信、数据加密和数据库等多种技术,计算机操作行为分析与数据安全管理系统的功能已经基本实现。
Using the technologies such as hook, network communication, data encrypting and database, computer operation analyzing and data security managing system has been implemented.
提出并实现了一种数据安全管理系统,对系统的设计目标、框架设计、功能设计以及核心模块的实现原理及方法进行了详细的论述。
Security of data in computer system is put forward and system frame design, function design, principle and method of core modules implement are all mentioned.
每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
在研究如何使用RFIDIC的安全特性之前,本文先回顾rfid数据管理的一些背景信息。
Before examining how to use the security features of RFIDIC, this article reviews some background information on RFID data management.
它收集了极端天气告知,安全系统,军事行动以及应急管理系统的数据。
It collects data for extreme weather notification and safety systems, military operations, and emergency management systems.
这包括有关预期加载、性能、安全、管理、可扩展性、可用性等方面的数据。
These included data about expected load and performance, security, management, scalability, availability, and so on.
在这种情况下,字段隐藏为用户提供的是接口管理,而不是真正的数据安全。
In this case, field hiding provides user interface management rather than true data security.
最后,XC10设备针对管理任务和数据网格安全提供细粒度用户和用户组权限。
Finally, the XC10 appliance provides fine-grained user and user group permissions for administrative tasks and data grid security.
这些策略由安全服务器集中管理,并且发送到根据需要保护数据的代理。
The policies are centrally managed by the security server and are sent to the agents that protect data as necessary.
典型的例子包括记录关于请求和响应的数据、处理安全协议、管理会话属性,等等。
Typical examples include logging data about the request or response, processing security protocols, managing session attributes, and more.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
如果Tomcat 仅用该数据库来获得容器管理的安全性,那么这就是最简单的解决方案。
This is the simplest solution if the database is used exclusively by Tomcat for container-managed security.
DB 2Viper数据服务器提供了许多新功能,这些功能包括:灵活的安全选项、数据存储优化以及针对存储、管理和查询XML数据而改进的支持。
The DB2 Viper data server provides many new capabilities including: flexible security options, data storage optimization, and improved support for storing, managing, and querying XML data.
数据安全性、保留和管理将是与标准有关的讨论以及编程约定的一部分。
Data security, retention, and management will be part of your standards discussion as well as programming conventions.
系统管理:数据管理、数据仓库安全性、系统和数据库的备份和恢复,等等。
System management: data management, data warehouse security, system and database backup and recovery, and so on.
注意,默认情况下数据库管理员或系统管理员并不拥有数据库安全管理员权限。
Note that a database administrator or system administrator does not possess the database security administrator authority by default.
UDDI规范的下一版本计划在2002年年中推出,重点在安全性、高级数据管理以及进一步的国际化上。
The next version of the UDDI Specification planned for mid-2002 will focus on security, advanced data management, and further internationalization.
银行使用的数据库必须迅速地找到相关信息,安全地管理交易、安全地与用户交互,而最重要的是不能丢失任何数据!
The database your bank USES must quickly locate the relevant information, safely manage the transactions, securely interact with users, and — most important — not lose any data!
在导入之后,由一个DB代理加密并由一个安全服务器管理的数据库备份映像可以恢复到由另一个安全服务器管理的另一个db代理。
By doing so, a database backup image encrypted by one DB agent and managed by one security server, can be restored to another DB agent managed by another security server.
数据库安全管理员还可以为用户授予豁免权。
The database security administrator can also grant exemptions to users.
客户机虚拟化的优点是,提供更高的数据安全性,更容易管理,减少最终用户的停机时间,确保业务连续性。
The advantage of client virtualization is that it provides higher data security, easier manageability, decreases end-user downtime, and ensures business continuity.
特别地,你会得到一个安全的CMS以管理数据,一个根据你的数据模型而定制的AS 3SWC文件及全部文档。
Specifically, you get a secure CMS to manage your data, an AS3 SWC file of classes tailored to your data model, and full documentation.
数据库安全管理员通过向用户授予安全标签来允许他们访问受保护的数据。
The database security administrator allows users access to protected data by granting them security labels.
角色从属关系由数据库安全管理员来管理。
Role membership is managed by the database security administrator.
在授予角色从属关系时,数据库安全管理员可以选择将这项能力授权给其他人。
The database security administrator can optionally delegate this ability to others when the role membership is granted.
然而,由负责保护数据安全的组织管理的内部审核以及变更流程,可帮助防止安全缺失。
However, internal reviews and change processes, managed by the organization responsible for safeguarding the data, help prevent security misses.
虽然DB 2提供了足够级别的安全性来确保数据在网络上的安全,但是仍然需要管理员配置DB 2特有的身份验证模块。
Although DB2 provides a sufficient level of security to safeguard the data over the network, it requires administrators to configure the DB2-specific authentication modules.
这是一款轻量级工具,能够集中化对数据库连接池、财务和安全性的管理。
It's a lightweight tool that centralizes management of database connection pooling, accounting, and security.
这是一款轻量级工具,能够集中化对数据库连接池、财务和安全性的管理。
It's a lightweight tool that centralizes management of database connection pooling, accounting, and security.
应用推荐