Every data source must have a defined custodian (a business role) responsible for the accuracy, integrity, and security of that data.
每个数据源必须有确定的管理人(业务角色)负责数据的精确性、完整性和安全性。
New principles for an age of big data sets will need to cover six broad areas: privacy, security, retention, processing, ownership and the integrity of information.
对于大数据集时代的新原则需涵盖以下六个广泛的领域:隐私、安全、产权保持力、处理、拥有和信息的完整性。
When discussing the cloud, there are many characteristics that should be discussed, including: multi-tenancy, security, data integrity verification, retrieval expectations, and exit strategies.
在讨论云时,有许多特性应该加以讨论,其中包括:多租户、安全性、数据完整性验证、恢复期望值以及退出策略。
While virtual desktops require network connectivity to function, you cannot overlook the security, mobility, and data integrity benefits of such a strategy.
尽管虚拟桌面需要网络连接才能工作,但是这种战略在安全性、可移动性和数据完整性方面具有很强的优势。
It provides powerful and flexible transaction support, and handles security, data integrity, and resource scheduling.
它提供强大且灵活的事务支持,可以处理安全、数据完整和资源调度。
This security enhancement feature supports data confidentiality and data integrity.
改进的安全特性支持数据保密性和数据完整性。
Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.
通过增强访问控制、身份标识和认证提高UDDI数据完整性从而使安全性问题得以解决。
In addition, the Domino server will be responsible for maintaining the data integrity on any updates through both Domino and DB2, with Domino security features enabled.
此外,在启用Domino安全性功能的情况下,通过Domino和DB 2进行任何更新时,Domino服务器将负责维护数据完整性。
It provides simple and efficient access to XML with the same levels of security, integrity, and resiliency taken for granted with relational data.
它提供了对XML的简单高效的访问,并为相关数据提供了相同的安全性、完整性和弹性。
In addition, all XML data is protected by the same security and data integrity controls that protect the traditional relational data.
另外,所有XML数据都受到用于保护传统关系数据的安全和数据完整性控件的保护。
It also includes the management objective of internal audit, which includes not only the audit IS protection of asset security and data integrity, but also the effectiveness of IS.
又包括内部审计的管理目标—即不仅包括被审计IS保护资产安全及数据完整,且包括IS的有效性目标。
Transfer tables, data, stored procedures, referential integrity constraints, security, and indexes. Specify the object (s) to transfer.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。请指定要传输的对象。
Security: Ensure that the component or system maintains user confidentiality, data integrity, and authorized permissions.
安全:确保组件或系统保证用户信息机密性、数据完整性、授权的允许性。
In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.
哈希算法在信息安全领域主要应用于验证数据完整性和签名认证。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured.
在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
Results By testing, it is known that these straggles can ensure the data security and integrity in integrated modular avionics system.
结果通过测试和论证这些策略能够保证综合化航空电子系统的数据安全性和完整性。
The former request for data to build a strong speech and integrity, a good library of data security.
对于前者要求建立起数据一致辞性和完整性强、数据安全性好的库。
Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.
数据完整性和合法存取会受到很多方面的安全威胁,包括密码策略、系统后门、数据库操作以及本身的安全方案。
DHI has certified that it adheres to the Safe Harbor Privacy Principles of notice, choice, onward transfer, security, data integrity, access, and enforcement.
兹证明,DHI符合安全港隐私原则中通知、选择、转送、安全、数据完整性、访问和执行的要求。
Information security not only includes guaranteeing the security of locally stored data, but also the confidentiality and integrity of data in the process of communication.
信息安全除了保证数据在本地存储过程中的安全,还应该满足其在网络传输过程中的保密性和完整性要求。
At the same time, the software deals with the real-time data by the means of memory database and USES the thread security class to maintain the data's integrity.
同时,对系统中大量实时数据则采用内存数据库管理方式,并利用线程安全类来保证读取数据的完整性。
To improve the security performance of DSP system, a novel security mechanism is designed, combining two security methods: AES bus encryption and data integrity checking.
为了提高DSP系统的安全性能,结合AES总线加密和数据完整性检测两种安全方式,设计了一种新的安全机制。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
The air interface security technologies for the protection of data confidentiality and data integrity in 3g are discussed.
讨论了第3代移动通信系统的空中接口安全保护技术,包括数据机密性保护、数据完整性保护。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
You can copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以传输表、数据、存储过程、引用完整性约束、安全性和索引。
You can transfer tables, data, stored procedures, referential integrity constraints, security, and indexes.
可以复制表、数据、存储过程、引用完整性约束、安全性和索引。
Copy tables, data, stored procedures, referential integrity constraints, security, and indexes.
复制表、数据、存储过程、引用完整性约束、安全性和索引。
应用推荐