• The security policy that a host sets on an application domain is called an application-domain security policy.

    应用程式应用程式定义域设定安全性原则称为应用程式定义域安全性原则

    youdao

  • Be sure to set a security policy that permits access via SSH. (Although CouchDB USES HTTP, you'll communicate with it through an SSH tunnel for simplicity's sake.)

    确保设置允许通过SSH访问安全策略。(虽然CouchDB使用HTTP,但考虑到简单性,通过一个SSH通道通信)。

    youdao

  • Members of that group have no knowledge of any other records in the system, other than those with their security policy.

    那个小组成员对这个系统中的其它记录是一无所知的,除了那些他们安全策略的记录。

    youdao

  • If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.

    如果用户拥有安全策略使用每个规则豁免权那么用户拥有受那个安全策略保护所有数据完全访问权。

    youdao

  • A security label belongs to a security policy and contains a value for each security component in that security policy.

    安全标签归属于一个安全策略并且安全策略中的每个安全组件包含一个

    youdao

  • First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.

    第一安全依赖技术政策联合体第二永远没有完全安全系统

    youdao

  • This comes oddly from a country that advocates a stronger EU foreign and security policy.

    一个提倡更强欧盟对外安全政策的国家显得尤为古怪。

    youdao

  • If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.

    如果用户拥有特定安全策略特定规则豁免权那么用户试图访问受该安全策略保护数据时,该规则将不起作用。

    youdao

  • SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.

    SECLABEL_BY_NAME:函数通过指定安全策略这个安全策略一个安全标签名称构建一个安全标签(内部编码表示)。

    youdao

  • It could be that a security setup that was acceptable several years ago when the queue manager was first defined is no longer consistent with your site security policy.

    可能出现下面的情况:一个安全性设置几年首次定义队列管理器合适的,但现在不再符合站点安全策略

    youdao

  • After creating a security policy, the security administrator creates security labels that are part of that policy.

    创建安全策略之后,安全管理员创建安全策略中的安全标签

    youdao

  • Data in a table can only be protected by security labels that are part of the security policy protecting the table.

    一个中的数据只能受到保护该表安全策略安全标签保护

    youdao

  • Flex clients will then ask for a policy file that is part of their security model.

    Flex客户端随后要求策略文件安全性模型一部分。

    youdao

  • The term WS-Policy refers to a framework that defines governance, such as the method of transport, and security, such as the level of encryption.

    术语WS-Policy定义治理例如传输方法安全性加密级别框架

    youdao

  • A Content Audit option that determines whether security policy calculation should be done in FM.

    一个内容审计选项,用来决定安全性策略计算是否FM内完成

    youdao

  • Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.

    8显示了使用业务流程策略管理组件企业业务应用程序提供业务安全服务业务应用程序服务。

    youdao

  • Of course, you should plan a good password policy and implement an authentication procedure that fits your required security level in your corporation.

    当然可以通过良好密码策略执行验证程序公司配备适当安全级别

    youdao

  • The security policy applicable to a system is in essence a well-defined "repository" of assertions regarding access permissions granted to the different entities in that system.

    适用系统安全策略实质上一个良好定义仓库”,它存储了授予这个系统不同实体访问权限断言

    youdao

  • This rule is verbose to make it easier to explain, but also because it expresses the security policy in such a way that, once you're familiar with the syntax, it's easy to understand and change.

    规则非常详细,一方面是为了便于解释一方面是因为这样方式表示安全策略一旦熟悉语法理解更改非常容易的。

    youdao

  • SCA provides the ability to define policy sets such as types of security and SLAs that can be reused across applications.

    SCA提供定义诸如安全类型以及SLA策略能力,这些策略能够跨应用系统使用。

    youdao

  • Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.

    管理员能够定于安全策略授权项目经理选择对于他们项目最好的安全策略

    youdao

  • Note that this is an example; you or your security policy might dictate additional parameters than are being used here.

    注意只是一个示例安全策略可能规定了其他参数,而不是这里使用的参数。

    youdao

  • This article is not a guide on AIX hardening or how to implement a security policy, but rather attributes relating to password policies that should be considered.

    本文并不讨论如何保护 AIX如何实现安全策略而是讨论密码策略相关的应该注意属性

    youdao

  • Kernel code is modified prior to accessing internal objects to invoke a hook that represents an enforcement function, which implements the security policy.

    访问内部对象之前内核代码进行修改,调用代表实施函数钩子实施函数实现安全策略。

    youdao

  • A security policy describes the criteria that is used to decide who has access to specific data.

    安全策略描述一个标准用于决定有权访问特定的数据。

    youdao

  • For example, a service can be selected from among a list of functionally equivalent services, based on its support for a specific privacy policy or the security assurances that it provides.

    举例来说,根据服务具体隐私策略支持着服务提供安全保证可以从功能上等价服务列表中选出服务。

    youdao

  • Now we can get down to extracting what information is required for a daily audit report, extracting the information that is relevant to your own audit security policy.

    现在我们可以提取日常审计报告需要信息,只提取自己的审计安全策略有关信息。

    youdao

  • There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.

    用户可以安全策略创建两种类型规则,从而防止泄露事件数据管理数据。

    youdao

  • There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.

    用户可以安全策略创建两种类型规则,从而防止泄露事件数据管理数据。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定