数据完整性
- data integrity
-
移动agent系统中的数据完整性分析
Data Integrity Analysis of a Mobile Agent System
-
SqlServer数据库系统中的数据完整性控制方法
The Method of Data Integrity Control in SQL Server Database System
-
ACCESS中数据完整性的实现
Implement of Data 's Integrity in ACCESS
-
基于SqlServer触发器的数据完整性应用
Application of Data Integrity Based on SQL Server Trigger
-
对于非原子Web流还是强烈推荐使用乐观锁来保护每个用户操作的数据完整性。
Optimistic locking is still highly recommended for non-atomic Web flows to protect the data integrity of each user action .
-
这种做法的目的在于保持数据完整性(如果State值发生了变化,City值很可能不再有效)。
This is done to preserve data integrity ( if the State value is change , the City value likely won 't be valid ) .
-
本文探讨了VISUALFOXPRO的数据完整性机制及其应用。
This paper inquires about data completeness mechanism and application of Visual FoxPro .
-
EnterpriseReplication的改进简化了管理、提高了数据完整性,并允许进行其他SQL操作。
The Enterprise Replication enhancements ease administration , improve data integrity , and allow additional SQL operations .
-
电厂MIS系统环境下的数据完整性
Data integrity on power plant MIS
-
日志分析是DB2RecoveryExpert的一个强大组件,可帮助您在保持数据完整性的情况下维护高可用性和完全控制。
Log analysis is a powerful component of DB2 Recovery Expert that helps you maintain high availability and complete control over data integrity .
-
在本文中涉及的安全性的三个需求包括:(a)验证(authentication)、(b)数据完整性(dataintegrity)和(c)数据机密性(dataconfidentiality)。
The security triad covered in this article comprises : ( a ) authentication ,( b ) data integrity , and ( c ) data confidentiality .
-
ORACLE系统数据完整性控制的方法及其实现策略分析
The Analysis of the Approach to Data Integrity Control and Its Implementation Strategies in Oracle Database System
-
基于VFP之DBMS数据完整性分析与应用
The Analysis and Applications Base on DBMS Data Integrality of VFP
-
如果定义包含数据库引擎因其无法再保证数据完整性的表达式,则可禁用check约束。
A check constraint may be disabled if the definition contains an expression for which the database engine can no longer guarantee the integrity of the data .
-
触发器是DBMS中提供的一种用来维护数据完整性的机制。
The trigger is a mechanism offered by DBMS to keep the integrity of data .
-
IPSec协议无缝地为IP引入安全特性,同时提供了身份验证、数据完整性、机密性和抗攻击性。
IPSec protocols " seamless " introduce of security features for IP , while providing authentication , data integrity , confidentiality and anti-aggressive .
-
通过修改隔离级别,J2EE开发人员或部署人员可以在性能的约束下平衡数据完整性,从而对应用程序进行调整。
By changing the isolation level , the J2EE developer or deployer can balance data integrity against performance constraints to performance tune the application .
-
WAP中WTLS层数据完整性的实现
HASH Function Implementation of the Integrity of Data in WAP 's WTLS
-
研究了数据库技术及其发展情况,根据ACCESS数据库的特点,选用了适合本系统的开发软件,探讨了ACCESS环境下的数据完整性的保护及建立安全的ACCESS数据库的问题。
Database technology and its development are studied . According to its characteristics , the system selects ACCESS as the development tool . The data completeness and database safety technologies in ACCESS are also discussed .
-
浅析VFP的数据完整性
An analysis of VFP data integrity
-
而函数依赖对于数据完整性、查询优化和数据集成等都具有非常重要的作用,对XML函数依赖的研究是进行XML数据库技术中其他相关研究的基础。
The Functional dependency plays an important role in data integrity , query performance and data completion . Research of the XML Functional dependency is the foundation for other XML database technologies .
-
触发器是SqlServer为应用程序开发人员提供的一种保证数据库中数据完整性的方法,它是一种特殊的存储过程。
Trigger is a kind of method that SQL server provides for application developer to assurance database in the data integrity , it is a kind of special stored procedure .
-
Hash函数是密码学一个重要组成部分,主要应用于数字签名、数据完整性校验和身份认证等领域中。
Hash function is an important part of Cryptography , it is widely used in digital signatures , data integrity detection and authentication .
-
DB2既可阻止此类操作被执行,也尝试以这种保护数据完整性的方式执行这些操作。
DB2 can either prevent such operations from being performed , or it can attempt to perform these actions in a way that will safeguard data integrity .
-
IPSec作为一种实施于网络层(IP)的安全协议,具有抗攻击、保护数据完整性、保护数据机密性和完美向前保密的诸多特性。
Of the TCP / IP model , IPSec has the advantages such as anti-attack , identity authorization , data integrity and confidentiality and perfect forward security .
-
数据完整性我们的MySQL数据库表格基于非事务性MyISAM引擎。
Data integrity Our MySQL database tables were based on the non-transactional MyISAM engine .
-
使用一个RI约束的主要原因是,确保当一个表引用另一个表时数据完整性得到维护。
The primary reason for using an RI constraint is to ensure that data integrity is maintained whenever one table references another .
-
现有的多级安全系统一般采用BellLapadula(BLP)模型,但是BLP模型的“向下读,向上写”的访问规则严重影响了系统的可用性、灵活性,破坏了数据完整性。
Most of current multilevel secure systems adopted Bell LaPadula ( BLP ) Model .
-
除非有着足够的数据完整性和私密性保护措施(如TLS或IPSEC),否则不应使用简单认证。
Simple authentication should not be used unless adequate data integrity and confidentiality protections are in place ( e.g.TLS or IPSEC ) .
-
因为在本质上不具有内在的ACID性质,所以MyISAM存储引擎的备份和恢复可以用来执行版本级恢复,但是不保证数据完整性。
Though inherently non-ACID by nature , MyISAM storage engine backup and recovery can be exercised to the level of version recovery without the data integrity promise .