• Interceptors are a special kind of invokers that provide additional function, such as data transformation, security, and transaction control.

    拦截器一种特殊调用器,它提供其他的功能比如数据转换安全性事务控制

    youdao

  • Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.

    当然不是所有应用程序都会访问关键数据这些程序开发人员确实能够通过加入访问控制增强应用程序的安全

    youdao

  • The following class diagram shows the relationship between the SAML assertion, security data parser, and control object.

    下面说明SAML断言安全数据解析控制对象之间关系

    youdao

  • Most issues of data security can be handled by appropriate authentication and access control, ensuring that only properly identified and authorized users can access data.

    通过适当认证访问控制确保只有具有适当身份经过授权用户可以访问数据,可以处理大多数数据安全问题

    youdao

  • Decentralized Information flow control (DIFC) is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world.

    DIFC这种安全手段应用程序作者能够控制应用的组成部分外部世界之间数据如何流动

    youdao

  • The increased transparency of XML data requires an increased transparency of application processing workflow in order to mitigate problems from security to state control.

    XML数据所带来透明性要求应用程序处理工作流的透明性也相应增加从而减少安全性状态控制方面的问题

    youdao

  • Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    安全策略定义安全标签组成指定控制敏感数据访问规则

    youdao

  • In order to show the effects of data disclosure control by defining and enabling security policies, you need to send a few sample events to RFIDIC by using its capture interface for message queues.

    为了显示定义启用安全策略所产生数据公开控制效果需要使用RFIDIC的捕捉接口RFIDIC发送一些示例事件

    youdao

  • Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.

    通过增强访问控制身份标识认证提高UDDI数据完整性从而使安全性问题得以解决。

    youdao

  • The quality of operation aspect is measured by being able to ensure a listener's ability to listen to arrival of data, ability to invoke a remote call as well as access control and transport security.

    操作方面质量通过保证监听监听数据到达、发起远程调用以及访问控制和传输安全性等功能判断的。

    youdao

  • Have security requirements like access control and data privacy been met in both existing and legacy systems?

    访问控制数据隐私等安全要求现有遗留系统得到满足了吗?

    youdao

  • LBAC is an implementation of Mandatory Access Control (MAC), which provides a reasonable level of security assurance for sensitive data stored in database.

    LBACMandatoryAccessControl (MAC)一个实现存储在数据库中的敏感数据提供了较高级别的安全保障

    youdao

  • One of the major features of NFS Version 4 is its support for enhanced security schemes, which allow stronger authentication, fine-grained access control, and encrypted data traffic.

    NFSVersion4主要特性之一就是增强型安全方案支持方案允许更强身份验证细粒度访问控制以及加密数据通信

    youdao

  • More database security: a new security feature called Label-Based access control (LBAC) allows you to control data access at the row and column level.

    增强了数据库安全性:基于标签的访问控制(Label BasedAccess Control,LBAC)是一种新的安全特性它使可以在行级别上控制数据访问。

    youdao

  • Longitudinal authentication: authentication, encryption, access control and other means to achieve the safe transmission of data and the security of the vertical sector.

    纵向认证:采用认证、加密访问控制手段实现数据安全传输以及纵向安全防护。

    youdao

  • Therefore, how to ensure that the confidential data can still be in the state of security control after the enterprise is issued, is the enterprise must solve the problem of security management.

    因此如何确保机密数据企业外发依然可以处于安全控制状态企业所必需解决安全管理问题

    youdao

  • If one page should not be cached, use "cache-control: no-cache, no-store" to make sure the page will not be cached, especially when the data involves security or sensitive information.

    如果某个页面应该缓存,则使用cache - control: no -cache, no -store确保页面不会被缓存,尤其是数据涉及安全敏感信息时。

    youdao

  • The sixth step: the inner industry staff will conduct image data of the guardrail maintenance complex before and after photos and security control areas of filing.

    第六:所人员护栏维修照片安全控制区影像资料进行归档整理。

    youdao

  • From data of accountant to information system of accountant, the paper builds the security control system of corporation accountant in the circumstance of E-commerce.

    本文点(会计数据)面(会计信息系统)构建电子商务环境下企业会计安全控制体系

    youdao

  • Integration of rural credit cooperatives' credit management system, the generic data access interface and security control implementation of the three-tier framework are analysed and researched.

    结合农村信用社信贷管理系统,对三层构架中的通用数据访问接口安全控制实现进行了分析研究

    youdao

  • The critical techniques such as data processing, design of reviewing algorithm and security control strategy are discussed.

    讨论系统关键技术包括数据处理阅卷算法设计安全控制策略等。

    youdao

  • The security of the information system generally included Data Integrity , Data Confidentiality , Authentication , Access Control , Non-repudiation and so on.

    对于信息系统安全性一般包括:数据完整性、数据保密性、身份确认认证、访问控制不可否认性等几个方面。

    youdao

  • This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.

    本文首先指出MPLSVPN可能受到安全威胁然后分析三层MPLS VPN数据控制管理面上安全性最后提出保持系统安全一些建议

    youdao

  • Mainly describes the integration and the update of anti-virus software on the security control units and realized the virus scanning on data of buffering area.

    重点描述了安全控制单元杀毒软件集成升级实现了缓冲区数据病毒扫描

    youdao

  • And then, security control of platform is introduced which include data encrypting, access control and other security control means.

    然后介绍平台安全控制方法:数据加密访问控制其他安全控制方法

    youdao

  • Analysis of real-time financial data, process control, rule observance, security application are fields in which data mining based embedded mobile database can be used.

    金融数据实时分析过程控制规章遵守安全应用这些都是基于嵌入式数据库的数据挖掘可以应用领域

    youdao

  • The security control of the information systems includes: hardware control, software control, data security control, system implementation control and management control.

    企业信息系统安全控制内容包括硬件设备控制、软件控制、数据安全控制、系统实施控制管理控制。

    youdao

  • Under the preconditions of sufficiency and security of original data quality features, this article aims to offer original data collection control measures to the analysis of original data collection.

    本文原始数据质量特征充分性可靠性前提,如何进行原始数据的采集分析提出原始数据的采集控制措施

    youdao

  • The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.

    信息系统中的安全性问题主要包含身份认证服务访问控制服务、数据保密服务、数据完整牲服务和不可否认服务几个方面。

    youdao

  • The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.

    信息系统中的安全性问题主要包含身份认证服务访问控制服务、数据保密服务、数据完整牲服务和不可否认服务几个方面。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定