To keep this example simple, assume that you have built a security schema in this Domino database, such that an employee can only edit her own address data.
为了保持简单,假设Domino数据库中已经建立了一种安全机制,每个雇员只能编辑自己的地址数据。
We'll then slowly increase the complexity of the security requirements and explain the XML Encryption schema and the use of its different elements.
然后我们将慢慢地增加安全性需求的复杂程度,并解释xml加密模式及其不同元素的使用。
All the database objects that are created for the security plug-in are encapsulated within a DB2AUTH schema.
为这个安全性插件创建的所有数据库对象都放在db2auth模式中。
The first basic change presented in Listing 4 is the extension of the ACORD schema by adding an optional element for a party's social security number (SSN).
清单4中的第一种基本变化是ACORD模式的扩展,增加了一个可选元素表示参与者的社会安全号码(SSN)。
Next month, we will continue this article series by describing the two remaining fundamental concepts in working with the ALM schema in ClearQuest — managing work, and administration and security.
下个月,我们将结束这个系列文章。我将描述剩下两个ALM模式中的基本概念-管理工作,管理及安全。
Returning to the schema, to fetch the social security number of type xs: string that's inside the policyholder-information complex type, XMLBeans provides the following method.
让我们再回到模式,为了提取policyholder -information复杂类型中的xs:string类型的社会安全号,XMLBeans提供了以下方法。
The requirements might call for WS-Security, for example, or support for a complex industry standard schema.
例如,需求可能是 WS-Security,或支持复杂的工业标准模式。
To prevent more widespread access to schema information, use file security mechanisms to secure source files and mapping files.
若要防止对架构信息进行更大范围的访问,请使用文件安全机制保护源文件和映射文件。
To prevent more widespread access to schema information, use file security mechanisms to secure source files and mapping files.
若要防止对架构信息进行更大范围的访问,请使用文件安全机制保护源文件和映射文件。
应用推荐