• 核心层可提供用于构建具有访问审核加密控制中间层基础

    The core layer provides a foundation upon which you build the middle layer with access, audit, and cryptographic controls.

    youdao

  • websphereCommerce 5.5起,访问控制基础结构得到了增强,提供策略订阅功能

    Since WebSphere Commerce 5.5, the access control infrastructure has been enhanced with the policy group subscription feature.

    youdao

  • 在此基础上,Spring2.5又加入了两个新的注解 —— @Service@Controller完成通常三层架构数据访问对象服务web控制角色委任

    Spring 2.5 adds two new annotations - @Service and @Controller - to complete the role designations for a common three-tier architecture (data access objects, services, and web controllers).

    youdao

  • 为了防止误用部署基础设施注册中心需要访问控制

    Both the deployment infrastructure and the registry also need access control, to prevent misuse.

    youdao

  • 代表了访问资源发起者JAAS框架中的访问控制决策建立基础

    It represents the originator of access to resources and forms the basis for access control decisions in the JAAS framework.

    youdao

  • 审计术语中控制没有技术上的标准只是一些过程通过它们可以访问标准,一定周期的基础进行审阅。

    In auditing lingo, controls are not technological measures, but are the processes by which technological measures are assessed and reviewed on a periodic basis.

    youdao

  • 配置服务服务器外运行时,没有其实施访问控制因为管理安全基础结构是在服务器内运行

    When config service runs outside the server, access control is not enforced, since the administrative security infrastructure runs inside the server.

    youdao

  • 基础设施:在非db 2目标配置q复制目标系统创建多个QApply控制通过别名访问目标表一样地访问控制表。

    Infrastructure: When you configure Q replication for non-DB2 targets, several Q Apply control tables are created on the target system and accessed through nicknames just as target tables are.

    youdao

  • WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    youdao

  • 最后方案设计基础实现认证访问控制系统结合RADIUS认证服务器构建实验系统平台

    At last, it achieved user authentication access control system on the foundation of scheme design, and constructing experiment platform combining RADIUS authentication server.

    youdao

  • 临时授权模型基础之上,我们详细讨论了XML访问控制若干技术问题

    Based on this provisional authorization model, several problems of XML access control technology are discussed in detail.

    youdao

  • 本文在研究r BAC访问控制模型基础,设计种应用电力MIS系统RBAC模型

    A sort of RBAC model for electric power MIS was designed on the basis of studying access control models.

    youdao

  • 论文自主开发空间数据库VISTA基础针对特定的对象-关系型数据结构,提出了相应的访问控制方法

    This paper describes the access control method for the specific relational-object data structure on the base of the self-developed spatial database, VISTA.

    youdao

  • 标记实现多级安全系统基础,实施强制访问控制前提

    Labels are the foundation for implementing multilevel systems and the prerequisite of enforcing mandatory access control in secure systems.

    youdao

  • 基础上,本文设计实现了一个XML访问控制系统——XACS

    Based on this, this paper designed and implemented an XML access control system named XACS.

    youdao

  • 论文对自主访问控制强制访问控制基于角色访问控制访问控制策略及机制分析、研究基础上,选择实现了基于角色的权限管理系统

    This paper chooses and realizes the privilege system role-based based on the further research between discretionary access control, mandatory access control and role-based access control.

    youdao

  • RBAC模型基础提出一种基于岗位角色的两级访问控制模型——PRBAC

    On the basis of RBAC model, this paper put forward a new model PRBAC, which was a twolevel model based on the post and role.

    youdao

  • 研究了相关的技术基础SNMP协议HTTP协议代理服务技术以及基于角色访问控制模型;

    Some techniques such as SNMP, HTTP, proxy's basic theory and role-based access control are introduced.

    youdao

  • 协议基于现有以太网硬件基础在应用层构造虚拟利用令牌控制来解决网络的访问冲突问题。

    This protocol is based on current hardware foundation of Ethernet and solves access conflict through token-control by creating virtual token on application layer.

    youdao

  • 身份认证一个完善的安全系统重要组成部分,是一道安全屏障,它是安全通信访问控制基础

    Identity authentication is an important part of a perfect secure system, the first defense, and the foundation of secure communication and access control.

    youdao

  • 论文首先分析了现有操作系统访问控制技术然后传统访问矩阵模型基础上,讨论访问矩阵模型,提出了基于程序的访问控制思想。

    In this article, we firstly analyze access control technology of current operating system. Then we discuss the three dimension access model, based on traditional access control model.

    youdao

  • 建筑管理信息系统中,基础数据访问权限控制一个重要的内容。

    It is very important to control the access to base data of the corporation in construct management information system.

    youdao

  • 基础提出校园网安全方案重点介绍了网络访问控制端点安全保护、协议分析网络安全监控相关技术

    On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.

    youdao

  • 角色的安全访问控制模型基础提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户

    And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.

    youdao

  • 该文介绍了RBAC代理机制相结合所带来授权问题,在定义了角色屏蔽概念基础上,提出了面向代理机制的角色访问控制模型

    This paper discusses the authorization problem and defines the conception of covered role, presents a proxy mechanism oriented role-based access control (PRBAC) model.

    youdao

  • 基础给出个基于组织建模企业级信息系统访问控制模型定义一组模型要素给出了实现访问控制机理

    Then, an access control model based on organization modeling for enterprise information systems is proposed, the elements are defined and the mechanism for realizing control access is advanced.

    youdao

  • 文中从实际应用出发,分析了现有访问控制技术基础上提出一种新的基于信任的P2 P访问控制模型

    In this paper, analyses the technique of access-control requirements in such environments and proposes a trust domain-based access control framework for P2P environment.

    youdao

  • 基于文件血统访问控制机制近年提出一种全新控制思路方法,本文是在基础上,提出了基于血统机制的文件模型。

    The access control based on file lineage mechanism is a new ideas and method in recent years, and a file lineage model is presented.

    youdao

  • 文档进行分类基础上,定义了一种双角色的基于角色的访问控制模型给出了此模型的数据流部分XACML形式表示控制策略。

    Based on the classifying of the protected documents, a DR-RBAC model is defined, and its data-flow diagram and two examples of PolicySets expressed by XACML are given out.

    youdao

  • 现有的访问控制系统模型基础上,提出一个使用数字水印进行资源远程访问控制方案

    Based on the access control model, we proposed a remote access control scheme for resources using digital watermarking.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定