Returns the specified sections of the access control security for the current registry key.
传回目前登录机码之存取控制安全性的指定区段。
There are two aspects included in database system security, which is access control security strategy and communication channel security.
数据库系统的安全性主要包括两个方面:访问控制策略和传输通道安全。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Some file systems support advanced security features, such as access control lists (ACLs).
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
Thus, management retains control over who can access each specific set of models, which prevents potential security violations.
因此,管理保留了对访问模型特定集合的控制权,这就阻止了潜在的安全性入侵。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
Pulling together information from a variety of sources also carries with it security concerns, including access control.
将多种来源的信息整合在一起将会带来包括访问控制在内的安全性问题。
Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.
传输层安全、消息级安全、入侵保护、身份认证和访问控制——安全的确是一等公民,而且网关中有证书来证实这一点。
Security administrators can control access to their databases at a level of abstraction that is close to the structure of their organizations.
安全管理员可以在接近于组织结构的抽象层次上控制对数据库的访问。
If access to projects is a concern, then you can create security policies that control access to certain groups.
如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。
Perhaps you need to access an existing inventory control system, a legacy customer database, or a mainframe-based security access control service.
或许您需要访问现有的库存控制系统、旧的客户数据库或基于大型机的安全性访问控制服务。
When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.
当配置服务在服务器外运行时,并没有对其实施访问控制,因为管理安全基础结构是在服务器内运行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
The security policy is used for access control checks, which are performed by the JVM at runtime.
安全策略用于访问控制检查,这是由JVM在运行时执行的。
Document control and security: for managing access to business-critical information and certifying document authenticity with digital signatures.
文档控制和安全:目的是为了管理以业务为主的信息的访问以及使用数字签名验证文档的真实性。
New access-control methods will also be introduced as research into operating system security continues.
随着对操作系统安全性的深入研究,将会引入新的访问控制方法。
The quality of operation aspect is measured by being able to ensure a listener's ability to listen to arrival of data, ability to invoke a remote call as well as access control and transport security.
操作方面的质量是通过保证监听器监听数据到达、发起远程调用以及访问控制和传输安全性等功能判断的。
This article addresses the problem of application-level security by breaking access into two manageable units: Workbench - and Control-level access.
本文通过将访问权集成到两个可管理单元(工作台级访问和控件级访问)的方式,解决了应用程序级的安全性问题。
Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.
可以通过策略实现安全措施(包括对部分网络的访问)或控制服务质量。
LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.
LBAC是MandatoryAccess Control (MAC)的一个实现,它为存储在数据库中的敏感数据提供了较高级别的安全保障。
Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
Records Management Services manage the retention, access control and security, auditing and reporting, and ultimate disposition of business records.
RecordsManagementServices管理业务记录的保存、访问控制和安全性、审计和报告以及最终处置。
Records Management Services manage the retention, access control and security, auditing and reporting, and ultimate disposition of business records.
RecordsManagementServices管理业务记录的保存、访问控制和安全性、审计和报告以及最终处置。
应用推荐