• In makes an applied multi-level relation model to be basement of security database for following the BLP model.

    为了适应BLP模型,采用一种实用多级关系 模型作为安全数据库基础原有 关系 模型的扩展。

    youdao

  • It is proved that the extended BLP model can enhance both the confidentiality and usability of the database system.

    经过证明,扩展BLP模型不仅增强数据库系统的机密而且增强了可用性

    youdao

  • The mechanism of buffer overflow from the point of view of security operating system is analyzed, buffer overflow with BLP model is formalized.

    首先分析操作系统客体类型,将客体分为静态客体动态客体,然后总结了安全操作系统中对客体的处理存在的问题。

    youdao

  • In this dissertation the integrated and privilege-role extended UNIX operating system security model, which is based on the BLP model, is discussed.

    BLP模型进行分析基础上,提出了BLP模型基础的完整性特权角色扩展UNIX操作系统安全模型。

    youdao

  • Using the operating action as object of control, the scheme pay much attention to the confidentiality of BLP Model, and also give consideration to the integrity.

    方案访问动作控制对象,着重体现BLP模型所要求机密性,同时对完整性有所考虑。

    youdao

  • The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.

    安全数据库管理系统安全策略可以数据库提供强大的安全功能,现在BLP模型用得比较普遍的策略模型之一

    youdao

  • The Biba security model is in essence the opposite of the BLP system, since it promotes no reading down and no writing up.

    比巴安全模型本质相反二层规划系统因为可以促进没有下来,没有文字阅读起来。

    youdao

  • The Biba security model is in essence the opposite of the BLP system, since it promotes no reading down and no writing up.

    比巴安全模型本质相反二层规划系统因为可以促进没有下来,没有文字阅读起来。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定