Attaching the security policy to the proxy component.
将安全策略附加到代理组件。
Creating tables protected by an LBAC security policy.
创建受LBAC安全策略保护的表。
A security policy can be created by DBSECADM as follows.
DBSECADM可以像下面这样创建安全策略。
Threat detection rules and security policy enforcement are needed.
需要有威胁检测规则并执行安全策略。
It can also be used to verify the effect of a new or changed security policy.
它还可以用来检验新的或修改的安全策略的效果。
A WS-Security policy needs to be created and applied to the Gateway service.
需要创建一个WS - Security策略并把它应用于Gateway服务。
Tivoli Access Manager contains a security policy which defines access to a domain.
TivoliAccessManager包含一个安全策略,它定义了对域的访问。
Improved security allowing administrators to enforce security policy across devices.
改进的安全性,管理员可以跨越设备强制应用安全策略。
This comes oddly from a country that advocates a stronger EU foreign and security policy.
这在一个提倡更强欧盟对外和安全政策的国家中显得尤为古怪。
Sugroups provides one method of implementing and managing the security policy on your systems.
sugroup提供一种在系统上实现和管理安全策略的方法。
Operational support for logging, tracing message exchanges, and enforcement of security policy.
为日志记录、跟踪消息交换以及安全性策略实施提供操作支持。
A security policy describes the criteria that is used to decide who has access to specific data.
安全策略描述一个标准,用于决定谁有权访问特定的数据。
A Content Audit option that determines whether security policy calculation should be done in FM.
一个内容审计选项,用来决定安全性策略计算是否在FM内完成。
Exemptions provide a way to allow users to bypass one or more access rules for a security policy.
豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。
The security policy is used for access control checks, which are performed by the JVM at runtime.
安全策略用于访问控制检查,这是由JVM在运行时执行的。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
The responsibility of enforcing a system security policy lies with a class called SecurityManager.
由一个名为SecurityManager 的类负责实施系统安全策略。
You need to alter the security policy using the new alter security policy statement to enable them.
为了启用它们,需要使用新的ALTERSECURITY policy语句修改安全策略。
An end user should evaluate a service provider's security policy before entering into a relationship.
在使用服务之前,最终用户应该评估服务提供商的安全策略。
Someone who determines your company's security policy can make those rules and buy or build the issuer.
公司安全策略决策者可以应用那些规则并可购买或创建授权机构。
After creating a security policy, the security administrator creates security labels that are part of that policy.
创建安全策略之后,安全管理员将创建安全策略中的安全标签。
Having stated the previous, it may not be the security policy of some systems to divulge passwords to other users.
某些系统的安全策略可能不允许向其他用户泄露密码。
Data in a table can only be protected by security labels that are part of the security policy protecting the table.
一个表中的数据只能受到保护该表的安全策略的安全标签的保护。
It also stores the information about the cell as a whole, such as cell-wide security policy, ticket lifetimes, etc.
它还存储了单元的整体信息,比如单元范围的安全策略、票证有效期等。
The security policy 7 defines the assertions used to create a secure access channel between the TCS and the service.
安全策略7定义用于在TCS和服务之间创建一个安全访问通道的声明。
The mobile device tends to loosen its security policy to allow access to device services such as local E-mail boxes.
移动设备可能放松安全策略,以允许访问本地电子邮箱之类的设备服务。
A security label belongs to a security policy and contains a value for each security component in that security policy.
一个安全标签归属于一个安全策略,并且为安全策略中的每个安全组件包含一个值。
Note that this is an example; you or your security policy might dictate additional parameters than are being used here.
请注意,这只是一个示例,您或您的安全策略可能规定了其他参数,而不是这里使用的参数。
Members of that group have no knowledge of any other records in the system, other than those with their security policy.
那个小组的成员对这个系统中的其它记录是一无所知的,除了那些他们安全策略的记录。
This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。
应用推荐