• In the final chapter of this paper, we make some research on the information security architecture of the E-government system.

    最后,对电子政务信息安全体系整个架构进行分析

    youdao

  • Develop and document a robust information security architecture as part of a process to establish an effective protection strategy.

    制定文件作为一个进程一部分健全信息安全架构建立有效保护战略

    youdao

  • Personal identity authentication is a key part in information security architecture and also the premise of the integral information security.

    个人身份认证信息安全体系一个非常关键环节。

    youdao

  • Database systems play a key role in the storage and processing of information and are vital parts of the overall information security architecture.

    而作为信息存储处理核心环节数据库系统整个信息安全体系占据着关键位置。

    youdao

  • The rules in the new model are reasonable and secure by analysis, and will rise the positive effect to design information security architecture model.

    分析表明模型定义规则合理的、安全信息安全体系结构模型的构建起到积极作用

    youdao

  • Documenting the information security architecture and its components is critical to understanding the overall protection strategy, and identifying single points of failure.

    记录信息安全体系结构及其组成部分认识至关重要整体保护战略确定了故障

    youdao

  • The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.

    如果没有完善设计安全性事件收集分析架构存储检索理解这样巨大信息量非常困难的。

    youdao

  • For too long, information security has been considered a separate discipline, isolated from the enterprise architecture.

    长久以来,信息安全一直认为是一门单独学科孤立企业架构之外。

    youdao

  • The security Assertion Markup Language specification (SAML) is an XML based framework that aims to solve problems associated with exchanging security information in an SOA architecture.

    SecurityAssertionMarkupLanguage规范(SAML)一个基于XML框架旨在解决SOA体系结构交换安全信息相关问题

    youdao

  • The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.

    架构需要涉及许多问题安全性访问控制服务水平协议,直到业务工作流事件处理信息管理和业务规则。

    youdao

  • Information security toolkit is used to develop information security products. Because of the defects of traditional toolkit, a new architecture based on module is presented in the paper.

    信息安全工具包用于开发信息安全应用产品基于传统工具包缺陷,需要构建一种新的基于模块信息安全工具包的体系架构

    youdao

  • This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.

    本文描述AT M网络中的信息安全可能受到的威胁、安全结构系统之间鉴别技术

    youdao

  • The improvement of information system security must start with architecture.

    提高信息系统安全必须从体系结构着手

    youdao

  • Intrusion detection system (IDS) is the key component of the architecture of information security.

    入侵检测系统(IDS)信息安全体系结构重要组成部分

    youdao

  • The design principle, system design and security strategy of integrative information security and protection architecture are discussed.

    以及一体化信息安全防护体系设计原则、系数设计、管理上的安全策略

    youdao

  • Security architecture is a base framework for building secure information systems and an important guideline for leading security development.

    安全体系结构构建安全信息系统支撑框架,是主导信息系统安全开发重要指南

    youdao

  • A new architecture with high security based on security kernel is presented in this paper, security kernel can ensure the information in the toolkit.

    文中描述了基于安全内核的、具有安全性信息安全包体系架构的设计。

    youdao

  • The purpose of the project is analyzing the current status of the information system, finding the limitation, and constructing the security architecture for the information system.

    项目目标目前铁路信息系统现状进行分析找出安全方面的缺陷漏洞,并基础上构造铁路信息系统安全构架

    youdao

  • So to design the security architecture of power information system, a systematic and structural design method and corresponding computer-aided tools are necessary.

    为此需要一种系统化结构化设计方法以及相应的辅助工具设计电力信息系统安全体系

    youdao

  • The logical security architecture of tactical C3I systems is investigated based on all the information domain security policies.

    建立了基于信息安全策略的战术C3I系统逻辑安全体系结构。

    youdao

  • The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.

    开放式架构系统,且大约30个技术合作伙伴有着密切的合作,包括视频管理访问控制实体安全信息管理系统。

    youdao

  • On this basis, further information on the classic frequent pattern mining algorithm and income security systems of telecommunications architecture is introduced.

    基础上进一步介绍了频繁模式挖掘经典算法以及电信收入保障系统体系结构。

    youdao

  • On this basis, further information on the classic frequent pattern mining algorithm and income security systems of telecommunications architecture is introduced.

    基础上进一步介绍了频繁模式挖掘经典算法以及电信收入保障系统体系结构。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定