The security policy that a host sets on an application domain is called an application-domain security policy.
主应用程式在应用程式定义域上设定的安全性原则就称为应用程式定义域安全性原则。
Be sure to set a security policy that permits access via SSH. (Although CouchDB USES HTTP, you'll communicate with it through an SSH tunnel for simplicity's sake.)
确保设置了允许通过SSH访问的安全策略。(虽然CouchDB使用HTTP,但考虑到简单性,您将通过一个SSH通道来与它通信)。
Members of that group have no knowledge of any other records in the system, other than those with their security policy.
那个小组的成员对这个系统中的其它记录是一无所知的,除了那些他们安全策略的记录。
If the user holds an exemption to every rule used by a security policy, then the user will have complete access to all data protected by that security policy.
如果用户拥有安全策略使用的每个规则的豁免权,那么该用户将拥有受那个安全策略保护的所有数据的完全访问权。
A security label belongs to a security policy and contains a value for each security component in that security policy.
一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。
First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.
第一,安全依赖于技术和政策的联合体。第二,永远没有完全安全的系统。
This comes oddly from a country that advocates a stronger EU foreign and security policy.
这在一个提倡更强欧盟对外和安全政策的国家中显得尤为古怪。
If a user holds an exemption on a particular rule of a particular security policy, that rule is not enforced when the user tries to access data protected by that security policy.
如果用户拥有一个特定安全策略的特定规则的豁免权,那么当该用户试图访问受该安全策略保护的数据时,该规则将不起作用。
SECLABEL_BY_NAME: This function builds a security label (internal encoded representation) by specifying a security policy and the name of a security label that is part of that security policy.
SECLABEL_BY_NAME:该函数通过指定一个安全策略和这个安全策略中一个安全标签的名称,构建一个安全标签(内部编码表示)。
It could be that a security setup that was acceptable several years ago when the queue manager was first defined is no longer consistent with your site security policy.
可能出现下面的情况:一个安全性设置在几年前首次定义队列管理器时是合适的,但现在不再符合您站点的安全策略。
After creating a security policy, the security administrator creates security labels that are part of that policy.
创建安全策略之后,安全管理员将创建安全策略中的安全标签。
Data in a table can only be protected by security labels that are part of the security policy protecting the table.
一个表中的数据只能受到保护该表的安全策略的安全标签的保护。
Flex clients will then ask for a policy file that is part of their security model.
Flex客户端随后会要求策略文件,这是其安全性模型的一部分。
The term WS-Policy refers to a framework that defines governance, such as the method of transport, and security, such as the level of encryption.
术语WS-Policy指定义治理(例如传输方法)和安全性(如加密级别)的框架。
A Content Audit option that determines whether security policy calculation should be done in FM.
一个内容审计选项,用来决定安全性策略计算是否在FM内完成。
Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.
图8显示了使用业务流程和策略管理组件为企业的业务应用程序提供业务安全服务的业务应用程序服务。
Of course, you should plan a good password policy and implement an authentication procedure that fits your required security level in your corporation.
当然,你可以通过良好的密码策略和执行验证程序在公司中配备适当的安全级别。
The security policy applicable to a system is in essence a well-defined "repository" of assertions regarding access permissions granted to the different entities in that system.
适用于一个系统的安全策略实质上是一个良好定义的“仓库”,它存储了授予这个系统中不同实体的访问权限的断言。
This rule is verbose to make it easier to explain, but also because it expresses the security policy in such a way that, once you're familiar with the syntax, it's easy to understand and change.
此规则非常详细,一方面是为了便于解释,另一方面是因为以这样的方式表示安全策略,一旦您熟悉了语法,要理解和更改它将是非常容易的。
SCA provides the ability to define policy sets such as types of security and SLAs that can be reused across applications.
SCA提供了定义诸如安全类型以及SLA等的策略的能力,这些策略能够跨应用系统使用。
Administrators can define security policies upfront, and empower project managers to choose the policy that best applies to their project.
管理员能够定于安全策略,并授权项目经理选择对于他们的项目最好的安全策略。
Note that this is an example; you or your security policy might dictate additional parameters than are being used here.
请注意,这只是一个示例,您或您的安全策略可能规定了其他参数,而不是这里使用的参数。
This article is not a guide on AIX hardening or how to implement a security policy, but rather attributes relating to password policies that should be considered.
本文并不讨论如何保护 AIX或如何实现安全策略,而是讨论与密码策略相关的应该注意的属性。
Kernel code is modified prior to accessing internal objects to invoke a hook that represents an enforcement function, which implements the security policy.
在访问内部对象之前对内核代码进行修改,以调用一个代表实施函数的钩子,该实施函数实现安全策略。
A security policy describes the criteria that is used to decide who has access to specific data.
安全策略描述一个标准,用于决定谁有权访问特定的数据。
For example, a service can be selected from among a list of functionally equivalent services, based on its support for a specific privacy policy or the security assurances that it provides.
举例来说,根据服务对具体的隐私策略的支持或着服务提供的安全保证,可以从功能上等价的服务的列表中选出服务。
Now we can get down to extracting what information is required for a daily audit report, extracting the information that is relevant to your own audit security policy.
现在,我们可以提取日常审计报告需要的信息,只提取与自己的审计安全策略有关的信息。
There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.
用户可以在安全策略中创建两种类型的规则,从而防止泄露事件数据和管理数据。
There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.
用户可以在安全策略中创建两种类型的规则,从而防止泄露事件数据和管理数据。
应用推荐