• This paper first introduces the concepts of data warehouse and problems of access security. It then introduces a tax data warehouse, focusing on the measures taken to ensure security of access to it.

    本文首先介绍了一些数据仓库概念访问安全方面的问题然后重点介绍了我们建立的税务数据仓库访问方面采取的安全措施

    youdao

  • There will be several different security domains, each of which have different access controls and restrictions.

    存在几种不同安全领域每个领域都不同访问控制限制

    youdao

  • The kernel usually has some sort of security model that manages access to devices, files, processes, and objects.

    内核通常具有某种类型安全模式管理设备文件进程对象的访问

    youdao

  • Another common trend is the application of service gateway patterns to provide enhanced access security for service endpoints.

    另一个常见趋势应用服务网关模式服务端点提供增强访问安全

    youdao

  • By allowing access only to certain users, you build in another level of security to your operations.

    通过允许某些用户访问,为操作增加另外安全

    youdao

  • Portal security controls the level of access to all the portal resources, including content.

    门户安全性控制所有门户资源(包括内容)访问级别

    youdao

  • Another important aspect of global variables is that when security of the information is an issue, controlling access is possible.

    全局变量另一重要方面考虑信息安全问题时,可以控制对信息的访问

    youdao

  • Thus, management retains control over who can access each specific set of models, which prevents potential security violations.

    因此管理保留了访问模型特定集合控制权就阻止了潜在安全性入侵

    youdao

  • They want to balance the desire to be on the front edge of access to the Indian market, with the collateral impact of compromising user security.

    他们希望平衡印度电信市场中保持强劲竞争力需求,及为了进入这个市场而必要的在用户通讯安全性方面的牺牲

    youdao

  • It is generally a fairly coarse-grained form of security that deals with access to functional areas of the system, perhaps defined by URLs or method calls on an EJB component.

    总的说来一种非常粗粒度安全形式,用于处理系统功能领域访问可以urlEJB组件方法调用进行定义

    youdao

  • Certainly not all applications access critical data, but developers of those that do can enhance the security of their applications by building in access control.

    当然不是所有应用程序都会访问关键数据这些程序开发人员确实能够通过加入访问控制增强应用程序的安全

    youdao

  • Access control. Enables the system to recognize security policies for groups of users.

    访问控制使系统能够识别用户安全性策略

    youdao

  • This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.

    涵盖任何安全管理解决方案具有的要素,比如用户认证访问权限控制审计点登录可用性日志记录。

    youdao

  • The security attributes of trusted context can be tuned to ensure air-tight access to the database servers.

    可以通过调优受信任上下文安全属性确保数据库服务器无懈可击访问

    youdao

  • Pulling together information from a variety of sources also carries with it security concerns, including access control.

    多种来源信息整合在一起将带来包括访问控制在内的安全性问题

    youdao

  • Information management is a huge topic that can involve discussions of content-management strategies, distributed access, federated security, and much more.

    信息管理一个庞大主题涉及到有关内容管理策略分布式访问联合安全性讨论

    youdao

  • Security measures, including access to portions of the network, or control over quality of the service, are best addressed through policies.

    可以通过策略实现安全措施(包括部分网络访问)控制服务质量

    youdao

  • To assess the status of food security - i.e. access to food, food availability and food utilization - in South Africa.

    旨在评估南非食品保障状况食品获取、食品供应食品利用情况

    youdao

  • Another important aspect of global variables is that where security of the information is an issue, controlling access is possible.

    全局变量另一重要方面考虑到信息安全性时,可以访问进行控制

    youdao

  • IDSLBACREADSET: Each set component of the user security label must include the set component of the data security label to allow access to data.

    IDSLBACREADSET:要访问数据用户安全标签每个集合组件必须包括数据安全标签的集合组件。

    youdao

  • In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.

    除了认证问题外,能够数据库服务器安全形成威胁还包括敏感信息未经授权访问

    youdao

  • Security of the database access relies on a JDBC driver and a database implementation.

    数据库访问安全依赖JDBC驱动程序数据库实现

    youdao

  • Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.

    安全策略定义安全标签组成指定控制敏感数据访问规则

    youdao

  • IDSLBACREADARRAY: Each array component of the user security label must be greater than or equal to the array component of the data security label to allow access to data.

    IDSLBACREADARRAY:要访问数据用户安全标签每个数组组件必须大于等于数据安全标签的数组组件。

    youdao

  • IDSLBACWRITEARRAY: Each array component of the user security label must be equal to the array component of the data security label to allow access to data.

    IDSLBACWRITEARRAY:要访问数据用户安全标签每个数组组件必须等于数据安全标签的数组组件。

    youdao

  • This article addresses the problem of application-level security by breaking access into two manageable units: Workbench - and Control-level access.

    本文通过访问权集成两个可管理单元(工作台访问控件级访问)方式,解决应用程序级的安全性问题

    youdao

  • While suid and sgid are handy, and even necessary in many circumstances, improper use of these access mode can allow breaches of a system's security.

    虽然suidsgid便利,甚至很多环境下必需,但是这些访问模式不适当使用造成系统安全上的漏洞

    youdao

  • Security and management: Provides a single point of control, access, and validation of web service requests.

    安全和管理提供Web服务请求控制访问验证

    youdao

  • Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    youdao

  • The cumulative way that access is granted explains why the RACF implementation of security for queues does not allow get and put access to be granted independently.

    累加方式授予访问权限解释了为什么队列RACF安全实现允许单独授予getput 访问权限。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定