Dynamic Distributed Defense Security Management Policy.
动态分布式防御安全管理策略。
Furthermore - the security management policy of project document, based on role - security-personnel, is presented to support information communication and security control.
提出基于角色权限人员的项目文档权限分配策略,支持了信息交流和安全控制。
Does the organization have security policy management frameworks in place?
组织拥有现成的安全政策管理框架吗?
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.
图8显示了使用业务流程和策略管理组件为企业的业务应用程序提供业务安全服务的业务应用程序服务。
SCAP can be used to quickly find known vulnerabilities and to automate activities such as ongoing security monitoring, vulnerability management and security policy compliance evaluation reporting.
SCAP可以用来快速查找已知的漏洞,以及持续的安全监测、脆弱性管理和安全政策的承诺评价报告等自动操作。
The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.
业务流程和策略管理组件使用了下面的安全组件,以实现它对业务应用程序的安全职责。
A typical process of policy based service security management can be divided into five steps and described as follows.
如下面所述,一个基于策略的服务安全管理的典型流程可以分为五大步骤。
A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.
精心制定的安全策略应该描述云计算服务的使用者和提供者应该做什么;它可以让提供者减少很多管理时间。
Leveraging so many services for maximum business value across many different business contexts, one concept they must consider carefully is security policy management.
要利用如此多的服务来在各种不同的业务背景下获得最大的商业效益,必须谨慎考虑的一个因素就是安全性策略管理。
Security policy management: Responsible for ensuring that the security policies are consistently defined and managed across the enterprise.
安全策略管理:负责确保整个企业一致地定义和管理安全策略。
Management plug-ins provide security, policy enforcement, and extensive logging capabilities.
管理插件提供安全性、策略强制执行和广泛的日志记录能力。
Tivoli Security Policy Manager - Provides a uniform point of administration of users, federation of user information, and privilege management.
TivoliSecurity PolicyManager——提供针对用户、用户信息联合和特权管理的统一管理点。
Policy-related requirements, such as security requirements on the users' and external system's access, ID management policies, audit and logging.
政策相关的需求,例如用户访问及外部系统访问的安全性需求,ID管理政策,审计和登录。
Policy based service security management.
基于策略的服务安全性管理。
Other mediation patterns provide direct or indirect access to the security and management policy definition points so that the mediation flow can perform the appropriate control.
其他中介模式提供了对安全和管理策略定义点的直接或间接访问,以便中介流能够执行适当的控制。
At the core of all SOA security is a policy-based infrastructure and management of the policies.
所有SOA安全的核心都是基于策略的基础设施和策略的管理。
When you apply an online policy to a directory on a host by using the Management Console, the policy is saved in the security server and is sent to the FS agent on the host.
当您使用ManagementConsole对主机上的目录应用在线策略时,该策略将保存在安全服务器并发送给主机上的FS代理。
Managing and securing service interactions as a policy enforcement point for security and management services as well as the registry.
作为安全和管理服务以及注册中心的策略执行点,对服务交互进行管理和保护。
For companies deploying service Oriented Architecture (SOA) and Web services, TFIM provides policy-based integrated security management for federated Web services.
对于部署面向服务体系结构和Web服务的公司,TFIM为联合Web服务提供基于策略的集成的安全管理。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
Network policy support includes LAN-based Class of Service and Quality of Service, advanced security and automated network management.
网络政策支持包括基于LAN的服务种类和服务质量、先进的安全性和自动的网络管理。
Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.
网络安全日志管理中心由转换模块、统计分析模块和策略再配置模块组成。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Security policy is the base of system security management.
安全策略是系统安全管理的基础。
This paper considers policy management in security group communication, include of policy define, reconciliation, translation and enforcement.
本文研究安全组策略的管理,包括组策略的制定、协商以及翻译、执行。
Information security management includes security risk assessment, security policy formulation, disaster recovery planning and to ensure the effectiveness of these policies.
负责公司的信息系统安全:评估和控制风险、制定安全政策、制定灾难恢复计划、确保政策与计划执行。
The security policy of security database management system provides the powerful security function to database. The model of BLP is one of common security policy model.
安全数据库管理系统的安全策略可以为数据库提供强大的安全功能,现在BLP模型是用得比较普遍的策略模型之一。
This thesis focuses on security problems of group communication, and intends to construct a policy-based security management infrastructure for group communication.
本文主要研究组通信的安全管理问题,目标是建立一个基于策略的组通信安全管理基础结构。
This thesis focuses on security problems of group communication, and intends to construct a policy-based security management infrastructure for group communication.
本文主要研究组通信的安全管理问题,目标是建立一个基于策略的组通信安全管理基础结构。
应用推荐