Finally, discrete access control based on protection bits can't provide global secure policy based on individual user.
基于保护位的自主型访问控制,很难实现基于单个用户制定全局安全策略。
All of these issues are solved in the thesis, including how to generate secure access policy rules centralized and how to enforce secure policy distribution efficiently.
由此,本文需要解决如何集中定制安全访问策略规则,以及有效实施安全策略交互。
First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.
第一,安全依赖于技术和政策的联合体。第二,永远没有完全安全的系统。
"We will keep on being a victim to shifts in the oil market until we finally get serious about a long-term policy for secure, affordable energy," Obama also said.
“如果没办法制定出长期的严谨政策,确保安全的、可承受的能源,我们将永远是石油市场波动的受害者。”奥巴马还说道。
Moreover, the capability declaration notes security policy so that multiple services can participate in a secure transaction communication.
此外,功能声明说明了安全策略,以便多种服务可以参与安全事务通信。
From a security standpoint, the deny all policy is the most secure one.
从安全角度出发,拒绝所有策略是最安全的。
The policy defines the secure protocol and credential passing required for secure interoperability between the TCS and the service.
策略定义了安全协议及TCS和服务之间的安全互通性所需的信任通道。
The security policy 7 defines the assertions used to create a secure access channel between the TCS and the service.
安全策略7定义用于在TCS和服务之间创建一个安全访问通道的声明。
The STS security configuration is nested inside the policy definition of the secure conversation token.
STS安全配置嵌在安全对话令牌的策略定义中。
One motivation for Japan's expansionary policy in the 1930s was the perceived need to secure raw materials.
在上世纪30年代,日本扩张政策的一个动机就是认识到需要确保自己的原材料供应。
The WebSphere DataPower SOA appliance is also used to enforce the security policy of the web service that requires the secure conversation. The scenario was implemented on
WebSphereDataPowerSOA设备也用于对需要安全会话的Web服务实施安全策略。
A password policy is put in place to ensure the systems that users access are secure.
密码策略用来确保用户访问的系统的安全性。
Allowing adventurous users to sniff around your files (especially your server configuration files) is not a good policy, but amazingly only 20% of current Web sites are secure.
允许好奇的用户访问你所有的文件(尤其是你服务器的配置文件)并不是一个好的策略,但是惊人的是当今互联网站点里只有20%的才是安全的。
Personal information is not transferred to third parties unless provided for otherwise in this Privacy Policy. Lonza Group may store information with a third party in encrypted form on secure servers.
除非本隐私政策另有说明,不会将个人信息转交至第三方,龙沙集团可将信息以加密形式存储在第三方之安全服务端。
Secure group communication is based on a consistent security policy.
安全组通信的前提是一致的安全策略。
This policy composition scheme is proved to be applicable and secure.
证明了该策略融合方案是可行的、安全的。
This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.
该文在安全路由协议的基础上,针对流量模式类攻击,提出一种基于数据链路监视的攻击检测机制。
A dynamic audit policy model based on secure spatial DBMS was proposed.
提出了一种基于安全空间数据库管理系统的动态审计策略模型。
The writer suggests that only the consistent policy could secure the operation of HRM holding good.
笔者认为只有达成外部及内部一致的政策才能保证人力资源管理实务的有效运行。
This paper proposes a generic audit policy model on multilevel secure DBMS.
提出了一种基于多级安全数据库管理系统的通用审计策略模型。
With such good cardres to carry out -the Party's policy we feel secure.
有这样的好群众推广党的政策,我们感到释怀。
To keep independent object-oriented system secure from Trojan horse, there exists already a restrictive policy that blends information flow control with discretionary access control.
描述了面向对象系统的数据模型,研究了信息流和信息传输,并以此为基础给出了基于自主访问控制策略的分布式对象系统的信息流控制方法。
Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.
在上世纪七十年代以前,为保证计算机系统中的信息安全性,自主存取控制和强制存取控制策略在计算机多安全级系统中得到了广泛的应用。
Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.
在上世纪七十年代以前,为保证计算机系统中的信息安全性,自主存取控制和强制存取控制策略在计算机多安全级系统中得到了广泛的应用。
应用推荐