In the final chapter of this paper, we make some research on the information security architecture of the E-government system.
最后,对电子政务信息安全体系的整个架构进行分析。
Develop and document a robust information security architecture as part of a process to establish an effective protection strategy.
制定和文件作为一个进程的一部分,健全信息安全架构,以建立一个有效的保护战略。
Personal identity authentication is a key part in information security architecture and also the premise of the integral information security.
个人身份认证是信息安全体系中一个非常关键的环节。
Database systems play a key role in the storage and processing of information and are vital parts of the overall information security architecture.
而作为信息存储和处理的核心环节,数据库系统在整个信息安全体系中占据着关键位置。
The rules in the new model are reasonable and secure by analysis, and will rise the positive effect to design information security architecture model.
分析表明,新模型中定义的规则是合理的、安全的,这对信息安全体系结构模型的构建将起到积极作用。
Documenting the information security architecture and its components is critical to understanding the overall protection strategy, and identifying single points of failure.
记录的信息安全体系结构及其组成部分的认识是至关重要的整体保护战略,并确定了单点故障。
The sheer amount of data makes the storage, retrieval, and understanding of this information very difficult without a properly designed security event gathering and analysis architecture.
如果没有完善设计的安全性事件收集和分析架构,存储、检索和理解这样巨大的信息量是非常困难的。
For too long, information security has been considered a separate discipline, isolated from the enterprise architecture.
长久以来,信息安全一直被认为是一门单独的学科,孤立于企业架构之外。
The security Assertion Markup Language specification (SAML) is an XML based framework that aims to solve problems associated with exchanging security information in an SOA architecture.
SecurityAssertionMarkupLanguage规范(SAML)是一个基于XML的框架,旨在解决SOA体系结构中与交换安全信息相关的问题。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
Information security toolkit is used to develop information security products. Because of the defects of traditional toolkit, a new architecture based on module is presented in the paper.
信息安全工具包用于开发信息安全应用产品。基于传统工具包的缺陷,需要构建一种新的基于模块的信息安全工具包的体系架构。
This paper describes information security, possible threats to be subjected, security architecture, and authentication technology between end systems in ATM network.
本文描述AT M网络中的信息安全、可能受到的威胁、安全结构和端系统之间的鉴别技术。
The improvement of information system security must start with architecture.
提高信息系统安全必须从体系结构着手。
Intrusion detection system (IDS) is the key component of the architecture of information security.
入侵检测系统(IDS)是信息安全体系结构的重要组成部分。
The design principle, system design and security strategy of integrative information security and protection architecture are discussed.
以及一体化信息安全防护体系的设计原则、系数设计、管理上的安全策略。
Security architecture is a base framework for building secure information systems and an important guideline for leading security development.
安全体系结构是构建安全信息系统的支撑框架,是主导信息系统安全开发的重要指南。
A new architecture with high security based on security kernel is presented in this paper, security kernel can ensure the information in the toolkit.
文中描述了一个基于安全内核的、具有高安全性的信息安全包体系架构的设计。
The purpose of the project is analyzing the current status of the information system, finding the limitation, and constructing the security architecture for the information system.
项目的目标是对目前铁路信息系统现状进行分析,找出安全方面的缺陷和漏洞,并在此基础上构造铁路信息系统安全构架。
So to design the security architecture of power information system, a systematic and structural design method and corresponding computer-aided tools are necessary.
为此,需要一种系统化和结构化的设计方法以及相应的辅助工具设计电力信息系统的安全体系。
The logical security architecture of tactical C3I systems is investigated based on all the information domain security policies.
建立了基于信息域安全策略的战术C3I系统逻辑安全体系结构。
The open-architecture systems work seamlessly with about 30 technology partners, including video management, access control and physical security information management systems.
开放式的架构系统,且与大约30个技术合作伙伴有着密切的合作,包括视频管理,访问控制和实体安全信息管理系统。
On this basis, further information on the classic frequent pattern mining algorithm and income security systems of telecommunications architecture is introduced.
在此基础上,进一步介绍了频繁模式挖掘的经典算法以及电信收入保障系统的体系结构。
On this basis, further information on the classic frequent pattern mining algorithm and income security systems of telecommunications architecture is introduced.
在此基础上,进一步介绍了频繁模式挖掘的经典算法以及电信收入保障系统的体系结构。
应用推荐