Interceptors are a special kind of invokers that provide additional function, such as data transformation, security, and transaction control.
拦截器是一种特殊的调用器,它提供其他的功能,比如数据转换、安全性和事务控制。
Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.
当然不是所有的应用程序都会访问关键数据,但这些程序的开发人员确实能够通过加入访问控制来增强其应用程序的安全。
The following class diagram shows the relationship between the SAML assertion, security data parser, and control object.
下面的类图说明SAML断言、安全数据解析器和控制对象之间的关系。
Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.
通过适当地认证和访问控制,确保只有具有适当身份和经过授权的用户可以访问数据,可以处理大多数数据安全问题。
Decentralized Information flow control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world.
DIFC这种安全手段,让应用程序的作者能够控制应用的组成部分与外部世界之间数据如何流动。
The increased transparency of XML data requires an increased transparency of application processing workflow in order to mitigate problems from security to state control.
XML数据所带来的透明性要求应用程序的处理工作流的透明性也相应增加,从而减少从安全性到状态控制方面的问题。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
In order to show the effects of data disclosure control by defining and enabling security policies, you need to send a few sample events to RFIDIC by using its capture interface for message queues.
为了显示定义并启用安全策略所产生的数据公开控制的效果,需要使用RFIDIC的捕捉接口向RFIDIC发送一些示例事件。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
The quality of operation aspect is measured by being able to ensure a listener's ability to listen to arrival of data, ability to invoke a remote call as well as access control and transport security.
操作方面的质量是通过保证监听器监听数据到达、发起远程调用以及访问控制和传输安全性等功能判断的。
Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.
LBAC是MandatoryAccessControl (MAC)的一个实现,它为存储在数据库中的敏感数据提供了较高级别的安全保障。
One of the major features of NFS Version 4 is its support for enhanced security schemes, which allow stronger authentication, fine-grained access control, and encrypted data traffic.
NFSVersion4的主要特性之一就是它对增强型安全方案的支持,该方案允许更强的身份验证、细粒度的访问控制以及加密的数据通信。
More database security: a new security feature called Label-Based access control (LBAC) allows you to control data access at the row and column level.
增强了数据库安全性:基于标签的访问控制(Label BasedAccess Control,LBAC)是一种新的安全特性,它使您可以在行和列的级别上控制数据访问。
Longitudinal authentication: authentication, encryption, access control and other means to achieve the safe transmission of data and the security of the vertical sector.
纵向认证:采用认证、加密、访问控制等手段实现数据的安全传输以及纵向界的安全防护。
Therefore, how to ensure that the confidential data can still be in the state of security control after the enterprise is issued, is the enterprise must solve the problem of security management.
因此,如何确保机密数据在企业外发后依然可以处于安全控制状态,是企业所必需解决的安全管理问题。
If one page should not be cached, use "cache-control: no-cache, no-store" to make sure the page will not be cached, especially when the data involves security or sensitive information.
如果某个页面不应该被缓存,则使用“cache - control: no -cache, no -store”来确保该页面不会被缓存,尤其是当数据涉及安全或敏感信息时。
The sixth step: the inner industry staff will conduct image data of the guardrail maintenance complex before and after photos and security control areas of filing.
第六步:所内内业人员将对护栏板维修复前、后照片及安全控制区的影像资料进行归档整理。
From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.
本文从点(会计数据)到面(会计信息系统)构建了电子商务环境下企业会计的安全控制体系。
Integration of rural credit cooperatives' credit management system, the generic data access interface and security control implementation of the three-tier framework are analysed and researched.
结合农村信用社信贷管理系统,对三层构架中的通用数据访问接口和安全控制实现进行了分析研究。
The critical techniques such as data processing, design of reviewing algorithm and security control strategy are discussed.
讨论了系统的关键技术,包括数据的处理、阅卷算法的设计和安全控制策略等。
The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.
对于信息系统的安全性一般包括:数据完整性、数据保密性、身份确认和认证、访问控制、不可否认性等几个方面。
This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.
本文首先指出三层MPLSVPN可能受到的安全威胁,然后分析了三层MPLS VPN在数据面、控制面和管理面上的安全性,最后提出保持系统安全的一些建议。
Mainly describes the integration and the update of anti-virus software on the security control units and realized the virus scanning on data of buffering area.
重点描述了安全控制单元中杀毒软件的集成和升级,并实现了对缓冲区中数据的病毒扫描。
And then, security control of platform is introduced which include data encrypting, access control and other security control means.
然后介绍了平台的安全控制方法:数据加密、访问控制和其他安全控制方法。
Analysis of real-time financial data, process control, rule observance, security application are fields in which data mining based embedded mobile database can be used.
金融数据的实时分析,过程控制,规章的遵守,安全应用这些都是基于嵌入式数据库的数据挖掘可以应用的领域。
The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.
企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制和管理控制。
Under the preconditions of sufficiency and security of original data quality features, this article aims to offer original data collection control measures to the analysis of original data collection.
本文就原始数据的质量特征在充分性和可靠性前提下,如何进行原始数据的采集分析,提出原始数据的采集控制措施。
The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.
信息系统中的安全性问题主要包含身份认证服务、访问控制服务、数据保密服务、数据完整牲服务和不可否认服务等几个方面。
The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.
信息系统中的安全性问题主要包含身份认证服务、访问控制服务、数据保密服务、数据完整牲服务和不可否认服务等几个方面。
应用推荐