• A few default types always exist with clearly defined access rules.

    通常存在一些带有明确定义的访问规则默认类型

    youdao

  • Read access rules are applied when a user attempts to read labeled data.

    用户试图带安全标签数据时,则应用访问规则

    youdao

  • LBAC read access rules are enforced while reading from both source and target tables.

    目标读取数据的过程中,LBAC读取访问规则执行

    youdao

  • Exemptions provide a way to allow users to bypass one or more access rules for a security policy.

    豁免权用户绕过安全策略中的多个访问规则提供了一种方式

    youdao

  • IDS has a predefined set of read and write access rules that are collectively called IDSLBACRULES.

    IDS预定义访问规则,它们被统称为IDSLBACRULES。

    youdao

  • If you want to restrict access to static files, configure access rules for those files in IIS.

    如果限制静态档案存取,请IIS中设定这些档案存取规则

    youdao

  • The utility tcpdmatch is a good tool for initially testing access rules before putting them in place.

    tcpdmatch工具非常适于在设置访问规则之前进行初始测试

    youdao

  • Server runtime is made up of the class libraries and their access rules for a specific type and version of server.

    服务器运行及其特定类型版本服务器的访问规则

    youdao

  • Write access rules are applied when data is written (INSERT, UPDATE, and DELETE operations) and can be summarized as follows.

    用户数据时(INSERTUPDATEDELETE操作),应用访问规则,写访问规则总结如下

    youdao

  • The read access rules are applied when data is read (SELECT, UPDATE, and DELETE operations) and can be summarized as follows.

    用户数据时(SELECTUPDATEDELETE操作),则应用访问规则,读访问规则总结如下。

    youdao

  • In this model, the access rules and the access control attributes are defined. The relations for the access control are set up.

    模型本体中的类定义访问规则访问控制属性,并由此建立了访问控制关系

    youdao

  • The DB2 LBAC approach is to allow users to define the set of components that make up a security label and to specify the access rules.

    DB2LBAC方法允许用户定义一组组件,以构成一个安全标签允许用户指定访问规则

    youdao

  • It analyzed the concepts of resource names, resource addresses, access rules, and addressing system formally in layered iteration model.

    结合模型形式化地分析了层次迭代模型中的资源名称、资源地址访问规则寻址系统概念

    youdao

  • If necessary, we could also add a Protected object Policy (POP) to any object, which adds additional protection, such as time-of-day access rules.

    有必要我们可以任何对象添加保护对象策略(Protected Object Policy,pop),从而提供额外的保护时段访问规则等。

    youdao

  • Notice that the public areas in each building need no ACL; you only need to create an ACL when the access rules for a resource deviate from that of the parent resource.

    注意每个大楼中的公共区域需要任何ACL资源访问规则偏离上一级资源访问规则时,只需创建 ACL。

    youdao

  • Data services also perform a critical governance function - they help centralize metrics, monitoring, version management, reuse of data types, and enforce data visibility and access rules.

    数据服务能够执行关键治理职能——它们有助于度量指标集中化监视版本管理、数据类型重用以及执行数据可视化访问规则

    youdao

  • An appeals court rejected the Securities and Exchange Commission's proxy-access rules, which were designed to make it easier for large shareholders to propose candidates for corporate boards.

    一个上诉法庭驳回证券交易委员会代理访问规则这个规则用来使股东方便提出公司的董事会成员候选人

    youdao

  • It also allows them to specify rules on access and audit controls, specify when and how to destruct the retained messages, and search content for investigation.

    本文可以让我们指定一些访问审计规则,指定何时以及如何销毁保存消息以及用于研究的搜索内容

    youdao

  • It provides a unified mechanism to manage the authentication of users and implement business rules determining user access to applications and data.

    提供一个统一机制管理用户身份验证实现业务规则来决定用户应用程序数据访问

    youdao

  • In this case, the mobile cloud conceivably can enhance enforcement of access control rules.

    这种情况下移动会理所当然增强访问控制规则实施

    youdao

  • Adaptive user interfaces also make it easier to comply with the changing rules and regulations around access control of information.

    自适应用户界面能使遵循信息访问控制相关不断变化规则规定变得更为简单。

    youdao

  • Filtering based on portal access control or personalization rules would be more efficient here.

    此处根据门户访问控制个性化规则进行筛选更为有效

    youdao

  • It packages information integration logic, cleansing rules, and information access as services.

    信息集成逻辑清理规则信息访问打包服务

    youdao

  • Data access services provide or prevent access to data based on authorizations and restrictions (policies and rules for access).

    数据访问服务基于授权限制(策略和访问规则)来提供阻止数据访问。

    youdao

  • It packages information-integration logic, cleansing rules, and information access as services.

    将信息集成逻辑清理规则信息访问打包服务。

    youdao

  • These modules provide extra authentication rules to harden access to your machine.

    这些模块提供额外的身份验证规则保护计算机访问

    youdao

  • These act as WSDL service and data interface definition, service location URL, and access protocol and message delivery rules, respectively.

    它们作用分别WSDL服务数据界面定义,服务位置url以及访问协议信息交付规则

    youdao

  • Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    安全策略定义安全标签组成指定控制敏感数据访问规则

    youdao

  • It packages information integration logic, cleansing rules, information access etc. as services.

    可将信息集成逻辑清理规则、信息访问等打包服务

    youdao

  • It packages information integration logic, cleansing rules, information access etc. as services.

    可将信息集成逻辑清理规则、信息访问等打包服务

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定