• Finally, discrete access control based on protection bits can't provide global secure policy based on individual user.

    基于保护的自主型访问控制,很难实现基于单个用户制定全局安全策略

    youdao

  • All of these issues are solved in the thesis, including how to generate secure access policy rules centralized and how to enforce secure policy distribution efficiently.

    由此本文需要解决如何集中定制安全访问策略规则,以及有效实施安全策略交互

    youdao

  • First, that security depends on a combination of technology and policy; and second, that no system is ever totally secure.

    第一安全依赖技术政策联合体第二永远没有完全安全系统

    youdao

  • "We will keep on being a victim to shifts in the oil market until we finally get serious about a long-term policy for secure, affordable energy," Obama also said.

    如果没办法制定出长期严谨政策确保安全的、可承受能源我们永远是石油市场波动的受害者。”奥巴马还说道。

    youdao

  • Moreover, the capability declaration notes security policy so that multiple services can participate in a secure transaction communication.

    此外功能声明说明安全策略以便多种服务可以参与安全事务通信

    youdao

  • From a security standpoint, the deny all policy is the most secure one.

    安全角度出发拒绝所有策略安全的。

    youdao

  • The policy defines the secure protocol and credential passing required for secure interoperability between the TCS and the service.

    策略定义安全协议TCS服务之间安全互通性所需信任通道。

    youdao

  • The security policy 7 defines the assertions used to create a secure access channel between the TCS and the service.

    安全策略7定义用于TCS服务之间创建一个安全访问通道声明

    youdao

  • The STS security configuration is nested inside the policy definition of the secure conversation token.

    STS安全配置安全对话令牌策略定义中。

    youdao

  • One motivation for Japan's expansionary policy in the 1930s was the perceived need to secure raw materials.

    上世纪30年代日本扩张政策一个动机就是认识需要确保自己的原材料供应。

    youdao

  • The WebSphere DataPower SOA appliance is also used to enforce the security policy of the web service that requires the secure conversation. The scenario was implemented on

    WebSphereDataPowerSOA设备用于需要安全会话Web服务实施安全策略

    youdao

  • A password policy is put in place to ensure the systems that users access are secure.

    密码策略用来确保用户访问系统安全性

    youdao

  • Allowing adventurous users to sniff around your files (especially your server configuration files) is not a good policy, but amazingly only 20% of current Web sites are secure.

    允许好奇的用户访问所有文件(尤其是服务器配置文件)不是一个好的策略但是惊人的是当今互联网站点只有20%的才是安全的。

    youdao

  • Personal information is not transferred to third parties unless provided for otherwise in this Privacy Policy. Lonza Group may store information with a third party in encrypted form on secure servers.

    除非隐私政策另有说明,不会个人信息转交第三龙沙集团将信息加密形式存储第三之安全服务端。

    youdao

  • Secure group communication is based on a consistent security policy.

    安全通信前提是一致的安全策略

    youdao

  • This policy composition scheme is proved to be applicable and secure.

    证明策略融合方案可行的、安全的。

    youdao

  • This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.

    该文安全路由协议基础针对流量模式攻击提出一种基于数据链路监视攻击检测机制

    youdao

  • A dynamic audit policy model based on secure spatial DBMS was proposed.

    提出基于安全空间数据库管理系统动态审计策略模型

    youdao

  • The writer suggests that only the consistent policy could secure the operation of HRM holding good.

    笔者认为只有达成外部及内部一致政策才能保证人力资源管理实务有效运行

    youdao

  • This paper proposes a generic audit policy model on multilevel secure DBMS.

    提出一种基于多级安全数据库管理系统的通用审计策略模型

    youdao

  • With such good cardres to carry out -the Party's policy we feel secure.

    这样群众推广党的政策我们感到释怀

    youdao

  • To keep independent object-oriented system secure from Trojan horse, there exists already a restrictive policy that blends information flow control with discretionary access control.

    描述了面向对象系统数据模型,研究了信息流信息传输,并以此为基础给出了基于自主访问控制策略的分布式对象系统的信息流控制方法。

    youdao

  • Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.

    上世纪七十年代以前保证计算机系统中的信息安全性自主存取控制强制存取控制策略在计算机多安全级系统中得到了广泛的应用。

    youdao

  • Before 1970, in order to protect the information security in computer systems, mandatory and discretionary access control policy had been widely applied in secure computer systems.

    上世纪七十年代以前保证计算机系统中的信息安全性自主存取控制强制存取控制策略在计算机多安全级系统中得到了广泛的应用。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定