They are granted to users to allow them access to protected data. 可以将安全标签授给用户,允许他们访问受保护的数据。
These instructions can make quick work of the task of making sure protected data can only be accessed by authorized entities on your Linux system. 这些指示可以快速确保受保护的数据只能由Linux系统上已授权的实体访问。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing. 豁免权使原本安全标签权限不足的用户可以访问受保护数据。
The security administrator allows users access to protected data by granting them security labels. 安全管理员通过为用户授予安全标签来允许用户访问受保护的数据。
For our simple purposes, a recoverable action is anything that modifies protected data. 简单地,可恢复的动作是修改被保护数据的任何事情。
Security labels are database objects applied to rows and columns in order to protect data, and granted to users to give them access to protected data. 安全标签是应用到行和列上以保护数据的数据库对象,将安全标签授给用户时他们才可以访问受保护的数据。
To access protected data in a change management system such as Rational Team Concert, you typically must furnish a user name and password. 为了访问RationalTeamConcert之类变更管理系统中受保护的数据,通过重复使用已存在的标准您必须能够完善用户名字和密码。
An exemption allows a user to access protected data that their security labels might otherwise prevent them from accessing. 豁免权使用户可以访问其安全标签不允许其访问的受保护数据。
When a mashup application integrates protected data sources or services acquired from another vendor, credentials are required to access these systems. 当mashup应用程序集成受保护的数据源或从其他供应商获得的服务时,若要访问这些系统,需提供凭证。
When a user tries to access protected data, his security label is compared to the security label that is protecting the data. 当一个用户试图访问受保护的数据时,必须将他的安全标签与保护数据的安全标签进行比较。
Direct ownership is a very common form of instance-based relationship between a user and some protected data. 直接所有权是用户和某些受保护数据间的一种十分常见的基于实例的关系。
The drive checks the password and grants access to the protected data if it is the correct one. 驱动器对密码进行核对,如果密码无误,则允许用户读取受保护的数据。
Protected data can be recovered later if you know the remote control code. 受保护的数据可以恢复后,如果你知道远程控制代码。
Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access data in your Protected Storage. 受保护存储帮助您保护您的私人数据。这些详细信息显示哪个程序在访问您的受保护存储中的数据。
The data on the replica may be inconsistent with the protected data so a consistency check is required. 副本上的数据与受保护的数据可能不一致,因此需要进行一致性检查。
The used view in accounting information system is great important for protected data completeness and sofety. 会计信息系统中,为了保障数据的完整和安全,采用视图技术尤为重要。
Many tasks break down into two distinct types of work, however: tasks that only need to read the protected data structures and those that must make changes. 因此,就必然会产生两种截然不同的任务:对保护数据结构体读取的任务和更改结构体的任务。
In this article, I will address the confidentiality aspect of data security: making sure protected data can only be accessed by authorized people or systems. 在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
The name of the protected data section. 受保护的数据节的名称。
Provides protected storage for sensitive data, such as private keys, to prevent access by unauthorized services, processes, or users. 提供对敏感数据(如私钥)的保护性存储,以便防止未授权的服务,过程或用户对其的非法访问。
While corporate and personal data can be protected through data encryption, effective retrieval of encrypted data is difficult to achieve by traditional means. 通过对数据进行加密可以保护企业及个人用户的数据隐私。
The three key technologies of tobacco toasting autocontrol system are to be realized stably temperature collecting, to be protected data after turn-off, and real time clock function. 烟叶烘烤自动控制系统的三大核心技术是实现稳定的温度采集、掉电保护、实时时钟功能。
In the maintenance process on the trusted computing platform, the integrity, security and usability of the protected data must be ensured. 在可信计算平台的维护过程中,需要保证保护数据的完整性,安全性和可用性。
Grade. Research on Principium of Privilege Protected of Data Segment 数据段的特权级保护机制研究
IKE is invoked to establish keys and security related parameters between hosts in order to protected the exchanged application data with them. IKE在主机之间建立共享密钥和相关的安全参数,用来保护应用程序交换的数据。
With personal privacy have become more concerned in modern society, privacy protected data mining has become an important research direction. 随着现代社会对个人隐私问题逐渐关注,保持隐私的数据挖掘技术已成为一个十分重要的研究课题。
What important is to ensure threat and protected data. we should use transfer security protocol to prevent been monitored. we have to consider about encryption when it necessarily to preserve sensitive data. 第一步是确定威胁及要保护的数据,如果必须保存敏感数据就要考虑加密。应启用安全传输协议以防范监听。
In this algorithm, the watermark is hidden in the protected data, so the protection has a strong disguise. 算法中,水印信息与被保护的数据融为一体,该保护具有较强的隐蔽性。
Watermarking can be used to differentiate whether the target is protected or not, watch the protected data to spread, distinguish between true and false, communicate in secret, hide the signs and control the illegal copy and so on. 水印可以用来判别对象是否受到保护、监视被保护数据的传播、真伪鉴别、秘密通信、标志隐含以及非法拷贝控制等重要应用,这实际上是发展数字水印的基本动力。