The examples query the order details based on the input order IDs.
这些示例将根据输入订单ID查询订单详细信息。
Files are protected based on user IDs and thus accessible only to the owner application, which has the same user ID.
文件基于用户ID受保护,因而只对所有者应用程序是可访问的(此应用程序具有相同的用户ID)。
The lookup stage caches the query result and performs the lookup operations on the cached order details based on the order IDs from the OrderID input link.
查找工作台将缓存查询结果并根据OrderID输入链接中的订单ID对缓存的订单详细信息执行查找操作。
The authorization policies defined to the Object Authority Manager (OAM) control access based on user IDs and group membership.
ObjectAuthorityManager (oam)中定义的授权策略可以基于用户ID和组成员身份进行访问控制。
Work items are managed by the authorization manager, based on the lists of associated user IDs provided by the staff support service, using the respective staff resolution plug-in.
工作项由授权管理员基于由人员支持服务所提供的关联用户ID列表并使用各自的人员解析插件来管理。
For example, if DB2 is configured with an operating-system-based authentication mechanism, users need valid operating system user IDs and passwords.
例如,如果DB 2使用一个基于操作系统的验证机制配置,则用户需要验证操作系统用户ID和密码。
An er domain consists of IDS servers that can replicate data between themselves based on user-defined criteria (this criteria is explained in later sections).
一个er域包含几个IDS服务器,可以基于用户定义的标准(将在稍后介绍)在这些服务器之间复制数据。
With ssh host-based authentication, hosts must establish a trust relationship, and then all user IDs on the configured hosts will be allowed to login as the same user ID on any other configured host.
对于ssh 基于主机的认证,主机必须建立一个信任关系,然后已配置主机上的所有用户ID都将可以凭相同的用户ID在任何其他已配置主机上登录。
IDS 11 provides a sound solution to these situation in Label-Based Access Control.
IDS11通过基于标签的访问控制(Label - Based Access Control)为这些情况提供了良好的解决方案。
Data Web services (DWS) is the next generation solution to significantly ease the development, deployment, and management of Web services-based access to DB2 and IDS database servers.
DataWebServices (DWS)是下一代解决方案,对于基于Web服务的DB2和IDS数据库服务器访问,该解决方案可显著简化其开发、部署和管理。
The caching capability is provided by defining caching policies and constructing cache-ids based on the following.
高速缓存的能力是根据下列因素定义高速缓存策略和构造cache - id来提供的。
Engagements can be set-up to allow client based surveys with IBM hosting the tool and providing access ids.
可以建立基于客户的调查(engagement),由IBM托管CAT工具并提供访问ID。
A PHP-based Web browser administration tool, OAT for IDS provides the ability to administer multiple database server instances from a single location.
它是基于PHP的Web浏览器管理工具,能够从单一位置管理多个数据库服务器实例。
Part 1 of this series introduced the IDS OAT, a Web-based interface for administering IDS, supported on IDS 11.10 and later. OAT offers many advantages.
本系列的第1部分介绍了IDSOAT,这是在IDS 11.10和更高版本上支持的基于Web的IDS管理界面。
For example, using the sample data in Figure 1, the following index idx1 would be useful for look-ups and joins based on author IDs across all documents in the XML column bookinfo of the table books.
例如,使用图1中的示例数据,可以根据author id使用下面的索引idx 1对表books的xml列bookinfo中的所有文档进行查找和连接。
Starting in Version 11.1, IDS contains cluster-based replication functionality.
从version 11.1开始,IDS包含了基于集群的复制功能。
With the Open Admin Tool, a PHP-based open source tool, and administrative SQL APIs, administration of IDS is minimal.
由于使用OpenAdminTool(这是一个基于PHP的开放源码工具)和SQLAPI 进行管理,IDS 的管理非常简便。
Based on this thought, we propose an IDS alert correlation model based on description logics.
在此思想基础上,进一步提出了基于描述逻辑的IDS告警关联模型。
This thesis presents data mining aided signature automatic discovery algorithm for network based IDS and detection rule creation algorithm.
提出了基于数据挖掘的网络入侵检测规则特征值自动发现算法和规则自动生成算法。
IDS based on data mining has the functions of self -learning and self -completing, it can detect the know and unknown intrusion activities.
基于数据挖掘的入侵检测系统具有一定的自学习性和自完善性,可以检测已知或未知的入侵行为。
In this paper, a detection-oriented attack classification method, based on data that IDS can collect directly, is proposed.
该文提出一种以ids可直接收集的数据为基础、面向检测的攻击分类方法。
It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.
它将基于网络和基于主机的入侵检测系统有机地结合在一起,提供集成化的检测、报告和响应功能。
This thesis constructs an IDS based on RBF neural network, which gives the basic thinking of design and the arithmetic, the method of collection and beforehand disposal way of the sample data.
本文主要构建了一种基于RBF神经网络的入侵检测系统,给出了基本的设计思想和算法,以及样本数据的收集和预处理方法。
It proposes an effective IDS that improves the modeling time and performance with only considering the events of privilege flows based on the domain knowledge of attacks.
通过仅仅考虑基于攻击域知识的特权流事件来缩短建模时间并提高性能,从而使系统更加高效。
The running and monitor problems of many system key programs in the system are researched and IDS prototype is put forward based on process behavior classifier.
并研究系统中多个系统关键程序的运行监控问题,提出了一个基于进程行为分类的入侵检测系统原型。
This paper presents an IDS model based on mobile agents, which adopts the research results from two fields: the distributed IDS and the mobile agent(MA).
本文提出了一种基于移动代理的IDS模型,它综合了两个领域的研究成果:分布式IDS和移动代理(MA)。
This paper applies distributed data mining algorithm to IDS, takes some research on distributed pattern extraction which is based on distributed association rules algorithm.
论文把分布式数据挖掘算法运用于入侵检测系统,研究了基于分布式关联规则算法的分布式模式提取。
The existence and construction of resilient functions in Encryption and the intelligentized improvement based on Machine Learning in IDS are the focus of information security.
密码技术中弹性函数的存在性与构造问题和入侵检测技术中基于机器学习的智能化改进是目前信息安全领域中的研究热点。
Traditional IDS systems based on packet level with capturing, reassembling and matching can't follow the desire of efficiency.
基于报文级别的捕获、还原、匹配的传统入侵检测系统效率无法满足要求。
Traditional IDS systems based on packet level with capturing, reassembling and matching can't follow the desire of efficiency.
基于报文级别的捕获、还原、匹配的传统入侵检测系统效率无法满足要求。
应用推荐