Enforcing data privacy requirements from modeling through test.
通过测试、从建模实施数据隐私要求。
IT COULD turn out to be the biggest breach of data privacy since the advent of the Internet.
这可能是互联网出现以来最大一宗违反数据保密的事件了。
Developers can use ODS to leverage this data privacy metadata to create an Optim TDM request.
开发人员可以通过ODS利用该数据隐私元数据创建OptimTDM请求。
The Atomic Domain window describes the key data privacy information for each of the data columns.
AtomicDomain窗口为每个数据列描述关键数据隐私信息。
Using this authentication service with DCE, RPC provides data availability and data privacy to users.
在DCE中使用此身份验证服务,RPC能够向用户提供数据可用性保证和数据隐私保障。
Message snooping — a direct attack on data privacy by examining all or part of the content of a message.
消息探听——通过检查消息中所有或部分内容对数据隐私进行直接攻击。
He has defined the data privacy masking rules and methods for the GSDB database that his developers use.
他为开发人员使用的GSDB数据库定义了数据隐私屏蔽规则和方法。
These categories help determine which of the data privacy masking algorithms to use for the specified data.
这些类别帮助确定对指定的数据使用哪种数据隐私屏蔽算法。
On the Data Privacy TAB, Tom indicates the following for the credit card number, as shown in Figure 10.
在Data Privacy选项卡上,Tom指出了以下与信用卡号相关的信息,如果10所示。
Have security requirements like access control and data privacy been met in both existing and legacy systems?
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
The provision to access persistent data as resources by a remote client raises data privacy and security concerns.
向一个远程客户端提供持久化数据访问可能会引起数据保密和安全问题。
Allow me to be brief and not data specific, being sensitive on data privacy for communications over the Internet.
出于互联网交流的数据隐私安全问题的考虑,请允许我只做简单说明,我也不会提到任何具体的数据信息。
Presumably the companies working together on International Data privacy Day don't believe that privacy online is a lost cause.
也许在“国际数据隐私日”上参与合作的公司并不相信网络隐私保护已经失败。
According to the research, security is the biggest barrier to the widespread adoption of cloud services, followed by data privacy.
根据调查,安全问题是云服务广泛应用中最大的障碍,其次就是数据保密问题。
Figure 14 shows the paste operation into DB2. If you specify that you want data privacy, Optim Development Studio does the following.
图14展示了到DB 2中的粘贴操作。
The network information security technique commonly includes authentication, authorization, audit, data privacy, data integrity and so on.
网络信息安全技术一般包括身份认证、授权控制、审计、数据保密和数据完整性等几个方面。
Today is the 3rd annual international Data Privacy Day and a whole bunch of companies are listed on the organization's website as participants.
这些公司为什么大力鼓吹保护个人隐私?该网站说:“数据隐私日是宣扬个人信息所体现的个体尊严的国际庆典。”
On the data Privacy TAB, Tom indicates the following for the customer email address, identifying it as a VARCHAR (128) data type, as shown in Figure 11.
在Data Privacy选项卡上,Tom指出关于客户电子邮件地址的信息,并将其标识为VARCHAR(128)数据类型,如图11所示。
With the rise of the Internet of things, it becomes more and more difficult to protect data privacy and security when the enterprise creates the product.
随着物联网的兴起,在企业创建产品时,保护数据隐私和安全变得越来越困难。
There are several other functions available in Optim in the data privacy area that provide various masking functions. For example, some of the functions include.
Optim在数据隐私方面还提供了几个其他函数,用于提供各种屏蔽功能。
In Asia countries that belong to APEC are trying to develop a set of regional guidelines for privacy rules under an initiative known as the Data privacy Pathfinder.
在亚洲,那些隶属APEC的国家在一项被称为“数据隐私探索者”的倡导下,正试图开发一套隐私管理区域准则。
In domains where data is king, or where data privacy is king, it's not very comforting, or copacetic, to just send it off to the ether-like abstraction of Bigtable.
在数据为王(或数据私密性为王)的领域中,只是将数据发送到像以太一样的Bigtable抽象让人感到不很舒服,或者说很不满意。
To take advantage of the extensive algorithms available in Optim Data Privacy Solution, the file must be accessed as if it were a relational table with columns.
为了利用 Optim Data PrivacySolution中的各种算法,文件必须是可以访问的,就像访问带有列的关系表那样。
European regulations are inspired by the conviction that data privacy is a fundamental human right and that individuals should be in control of how their data are used.
欧洲人坚信数据隐私是重要人权,每个人都应该掌管个人数据的使用,这一思想也启发了欧洲相关规章制度的制定。
Ironically, this has come at the same time that Google has upped its commitment to open data policies, which enable users to control their own data privacy policies.
具有讽刺意味的是,这件事发生的同时,谷歌正好实现了资料开放政策的承诺,这个政策允许用户操纵自己的资料隐私政策。
's Taobao e-commerce site. It also stipulates a mandatory seven-day return policy for most goods and says online-payment platforms must safeguard users' data privacy.
它还规定,大部分商品必须实行七天退货政策,并且要求网络支付平台必须保护用户的数据隐私。
There are laws related to safeguarding the data privacy of critical client data since (along with customer loyalty and trust) revenue of millions of dollars can be at stake.
由于几百万美元的收入(以及客户忠实度和信任)都会因关键业务数据的泄露而濒于险境,因此有关保护关键客户数据的数据隐私的相关法律也日益健全。
With the growing concern over data privacy-preserving problem, how to discover association rules from distributed databases becomes one of the hot topics of this field.
数据隐私问题引起人们的广泛关注,如何在分布式数据库的环境下挖掘关联规则成为研究的热点。
For example, it can help ensure that important requirements around data privacy do not fall through the cracks as an application and data move through development and deployment.
例如,改进后的协作能够确保当一个应用程序或数据通过开发和部署时,围绕数据隐私的重要要求不会被忽略。
The data architect then creates a domain model, along with a set of atomic domains, each describing the required data privacy masking methods for a particular domain, such as credit card data.
然后,创建一个域模型和一组原子域,每个原子域都描述特定域所需的数据隐私屏蔽方法,比如信用卡数据。
应用推荐