A few default types always exist with clearly defined access rules.
通常存在一些带有明确定义的访问规则的默认类型。
Read access rules are applied when a user attempts to read labeled data.
当用户试图读带安全标签的数据时,则应用读访问规则。
LBAC read access rules are enforced while reading from both source and target tables.
在从源表及目标表读取数据的过程中,LBAC读取访问规则被执行。
Exemptions provide a way to allow users to bypass one or more access rules for a security policy.
豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。
IDS has a predefined set of read and write access rules that are collectively called IDSLBACRULES.
IDS有一组预定义的读和写访问规则,它们被统称为IDSLBACRULES。
If you want to restrict access to static files, configure access rules for those files in IIS.
如果您要限制对静态档案的存取,请在IIS中设定这些档案的存取规则。
The utility tcpdmatch is a good tool for initially testing access rules before putting them in place.
tcpdmatch工具非常适于在设置访问规则之前对其进行初始测试。
Server runtime is made up of the class libraries and their access rules for a specific type and version of server.
服务器运行时由类库及其对特定类型和版本的服务器的访问规则。
Write access rules are applied when data is written (INSERT, UPDATE, and DELETE operations) and can be summarized as follows.
当用户写数据时(INSERTUPDATE和DELETE操作),则应用写访问规则,写访问规则可总结如下。
The read access rules are applied when data is read (SELECT, UPDATE, and DELETE operations) and can be summarized as follows.
当用户读数据时(SELECT、UPDATE和DELETE操作),则应用读访问规则,读访问规则可总结如下。
In this model, the access rules and the access control attributes are defined. The relations for the access control are set up.
该模型为本体中的类定义了访问规则和访问控制属性,并由此建立了访问控制关系。
The DB2 LBAC approach is to allow users to define the set of components that make up a security label and to specify the access rules.
DB2LBAC方法是允许用户定义一组组件,以构成一个安全标签,并允许用户指定访问规则。
It analyzed the concepts of resource names, resource addresses, access rules, and addressing system formally in layered iteration model.
结合模型形式化地分析了层次迭代模型中的资源名称、资源地址、访问规则和寻址系统等概念。
If necessary, we could also add a Protected object Policy (POP) to any object, which adds additional protection, such as time-of-day access rules.
如有必要,我们还可以向任何对象添加受保护对象策略(Protected Object Policy,pop),从而提供额外的保护,如时段访问规则等。
Notice that the public areas in each building need no ACL; you only need to create an ACL when the access rules for a resource deviate from that of the parent resource.
注意,每个大楼中的公共区域不需要任何ACL;当资源的访问规则偏离上一级资源的访问规则时,您只需创建 ACL。
Data services also perform a critical governance function - they help centralize metrics, monitoring, version management, reuse of data types, and enforce data visibility and access rules.
数据服务还能够执行关键的治理职能——它们有助于度量指标的集中化、监视、版本管理、数据类型的重用,以及执行数据可视化和访问规则。
An appeals court rejected the Securities and Exchange Commission's proxy-access rules, which were designed to make it easier for large shareholders to propose candidates for corporate boards.
一个上诉法庭驳回了证券交易委员会的代理访问规则,这个规则用来使大股东更方便地提出公司的董事会成员候选人。
It also allows them to specify rules on access and audit controls, specify when and how to destruct the retained messages, and search content for investigation.
本文还可以让我们指定一些访问审计规则,指定何时以及如何销毁所保存的消息以及用于研究的搜索内容。
It provides a unified mechanism to manage the authentication of users and implement business rules determining user access to applications and data.
它提供一个统一的机制来管理用户的身份验证,并实现业务规则来决定用户对应用程序和数据的访问。
In this case, the mobile cloud conceivably can enhance enforcement of access control rules.
这种情况下,移动云会理所当然地增强访问控制规则的实施。
Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.
自适应用户界面还能使遵循与信息访问控制相关的不断变化的规则和规定变得更为简单。
Filtering based on portal access control or personalization rules would be more efficient here.
此处根据门户访问控制或个性化规则进行筛选会更为有效。
It packages information integration logic, cleansing rules, and information access as services.
它将信息集成逻辑、清理规则和信息访问打包为服务。
Data access services provide or prevent access to data based on authorizations and restrictions (policies and rules for access).
数据访问服务基于授权和限制(策略和访问规则)来提供或阻止数据访问。
It packages information-integration logic, cleansing rules, and information access as services.
它将信息集成逻辑、清理规则和信息访问打包为服务。
These modules provide extra authentication rules to harden access to your machine.
这些模块提供额外的身份验证规则,保护对计算机的访问。
These act as WSDL service and data interface definition, service location URL, and access protocol and message delivery rules, respectively.
它们的作用分别是WSDL服务和数据界面定义,服务位置url,以及访问协议和信息交付规则。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
It packages information integration logic, cleansing rules, information access etc. as services.
它可将信息集成逻辑、清理规则、信息访问等打包为服务。
It packages information integration logic, cleansing rules, information access etc. as services.
它可将信息集成逻辑、清理规则、信息访问等打包为服务。
应用推荐