有限訪問數據 的英文怎麼說
中文拼音 [yǒuxiànfǎngwènshǔjù]
有限訪問數據
英文
limited access data- 有 : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
- 限 : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 有限 : limited; restricted; finite; a little; not much
- 訪問 : visit; call on; interview; access; addressing; reference to
- 數據 : data; record; information
-
Limited metadata accessibility means the following
有限的元數據可訪問性意味著:Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on
安全性策略配置目標包括控制對數據的原始訪問、保護內核和系統軟體的完整性、防止有特權的進程執行危險的代碼,以及限制由有特權的進程缺陷所導致的傷害。6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data
6 )採用嚴格的訪問控制方式與權限管理機制。 fsca系統充分保證了用戶數據訪問的合法性與有效性。It is important to set up the acl to databases with the proper access
設置acl ,使之具有適當的權限訪問數據庫,這非常重要。Some data access methods perform very well, but are only useful in a limited number of scenarios
一些數據訪問方法執行得很好,但是這僅僅是在某些限制數量的場合中蔡有用。If a programming element represents proprietary functionality, or contains confidential data, you usually want to limit access to it as strictly as possible
如果編程元素表示專有功能或包含機密數據,則通常需要盡最大可能嚴格限制對它的訪問。It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication
通過ah和esp協議來以下的安全服務:訪問控制,無連接完整性,數據源認證,重放攻擊保護,機密性和有限的通信流保密性。Users that have no access to system tables or database files cannot retrieve the obfuscated text
對系統表或數據庫文件沒有訪問權限的用戶不能檢索模糊文本。It gives users secure access to data, it resources, transactions, and processing power that were previously locked up in proprietary systems, so they can better address their clients needs.
它使用戶可以安全地訪問數據、 it資源、事務以及先前被限制在私有系統上的處理能力,因此,那些公司可以更好地滿足客戶的需求。 」For more information about specifying mining structure access, see granting mining structure and mining model permissions to database roles
有關指定挖掘結構訪問權限的詳細信息,請參閱「授予數據庫角色挖掘結構和挖掘模型的權限」 。As a practice of above idea and theory, this paper rewrites a structure analysis of finite element program which based on the object - oriented programming technology. using current popular visual c + + developing tool and odbc database connectivity technology, this paper develops a data management program fedms of cae software pre - processing and post - processing data. the program realizes data management using engineering database, visual i / o method and promotes the integration of cae software into civil engineering cad system
此外,作為上述理論和方法的實踐,重寫了一個採用面向對象技術和有限元方法的通用平面桿系結構分析程序finite ,應用當前比較流行的visualc + +開發工具的odbc數據庫連接訪問技術,研製了一個后臺基於microsoftaccess數據庫的cae軟體數據前後處理系統fedms ( finiteelementdatamanagementsystem ) ,對結構分析計算中的前後處理數據進行了有效的管理。When you are detaching or attaching a database, the database engine tries to impersonate the windows account of the connection performing the operation to guarantee that the account has permission to access the database and log files
分離或附加數據庫時,數據庫引擎嘗試模擬執行該操作的連接的windows帳戶,從而保證該帳戶具有訪問數據庫和日誌文件的權限。There is, however, a built - in access control list mechanism involving flat files or databases
但是,有一個內建的對普通文件和數據庫訪問的權限控制機制。For more information about specifying dimension data access for a role, see specifying attribute permissions in a dimension
有關為角色指定維度數據訪問權限的詳細信息,請參閱「在維度中指定屬性權限」 。For more information about specifying dimension access for a role, see granting dimension - level permissions to database roles
有關為角色指定維度訪問權限的詳細信息,請參閱「授予數據庫角色維度級別的權限」 。With isolated storage, your code no longer needs unique paths to specify safe locations in the file system and data is protected from other applications that only have isolated storage access
通過獨立存儲,代碼不再需要使用唯一的路徑來指定文件系統中的安全位置,同時可以保護數據免遭只具有獨立存儲訪問權限的其他應用程序的損壞。Even though the user eileen has the proper privilege to access a nickname, the underlying remote object privilege will be rechecked by the remote data source against the remote user id that the federated system uses to establish the connection on behalf of eileen
即使用戶eileen具有訪問一個昵稱的適當權限,遠程數據源仍將對聯邦系統用來代表eileen建立連接的遠程用戶id進行底層遠程對象權限的檢查。This paper focuses on the main limitation - unable to share the data surely and effectively - of the existing systems. on the basis of the computer making train diagram system ver2. 0, brings fonvard the new style system of making diagram with computer based on the b / s architecture. in the paper, the author makes studies on the data permission security and transport security problems of the train diagram system that is based on computer networks and distributed system
0 》的基礎上,針對目前國內計算機編圖系統的主要不足? ?無法安全有效的實現數據信息共享,提出基於b s體系架構的新型編圖系統整體方案,並對處于網路互聯狀態下、分散式處理系統的列車運行圖數據訪問權限以及數據傳輸安全問題進行深入的研究。The encrypting file system ( efs ) in windows 2000 complements existing access controls and adds a new level of protection for your data
Windows2000的加密文件系統( efs )補充了現有的訪問權限控制,並為數據添加了一級新的保護措施。Exterior threats include the malicious code, denial of service, stealing and juggling data during transmission ; internal threats include privacy leakage, illegal access and modification. all these threats must be solved during the system construction
外部威脅包括數據在傳輸中可能被竊取和篡改,惡意代碼,和拒絕服務( dos ) ;內部威脅包括了對系統代碼的竊取和修改,員工有意和無意的訪問、修改一些他們沒有權限訪問的數據。分享友人