• Traditional single security technology is becoming obsolete with the complexity of network security problems increased. To address this problem, a new security system architecture is proposed.

    针对单一网络安全技术已经无法很好的解决日益复杂网络安全问题提出了一种新型的安全系统

    youdao

  • You should use the best practices in conjunction with security best practices and policies that are in place at other levels in your system architecture to ensure a comprehensive secure solution.

    应该这些最佳实践系统架构其他级别上的安全最佳实践策略结合使用确保获得完善的安全解决方案。

    youdao

  • After three architecture reviews, it was clear that there were issues in the system design concerning performance, security, and management.

    体系结构复查之后系统设计存在有关性能安全性管理问题变得明显了。

    youdao

  • Security can be applied at different levels of a system architecture.

    系统架构不同级别应用安全性

    youdao

  • Beneath all the capabilities of the WebSphere Integration Reference Architecture are the management services for security, directory, system management, and resource virtualization.

    位于WebSphereIntegrationReferenceArchitecture所有功能之下安全性目录系统管理资源虚拟化管理服务

    youdao

  • You model domain architecture views, such as Applications, Infrastructure, Networks, and Security, by creating ABBs to describe enterprise-critical system composition and behavioral patterns.

    通过创建ABB描述企业关键系统组成行为性模式可以为架构视图建模例如应用基础设施(Infrastructure)、网络安全

    youdao

  • The security architecture is made of a security gateway and an operating system library which tags data as it is being used by the web application.

    整个安全架构个安全网关操作系统组成,Web应用可使用该操作系统库标记数据

    youdao

  • This paper presents the bluetooth security architecture, expounding the security system of the link layer and application layer.

    本文蓝牙技术安全结构作了描述,详细介绍了蓝牙链路应用层的安全机制

    youdao

  • With the advent of 3g mobile systems a serious effort has been made to create a consistent security architecture based on the threats and risks a 3g system faces.

    随着第三代移动通信系统(3G)出现,需构建一个能够解决3g将要面临的各种安全威胁和谐同一安全结构体系

    youdao

  • The improvement of information system security must start with architecture.

    提高信息系统安全必须从体系结构着手

    youdao

  • Based on talking about cryptography architecture of RMS, this thesis analyses security of RMS and points out problems that should be noticed for building high-level Rights Management System.

    文章介绍RMS密码架构基础上,安全性进行分析指出构建更高强度的权限管理系统注意问题

    youdao

  • Intrusion detection system (IDS) is the key component of the architecture of information security.

    入侵检测系统(IDS)信息安全体系结构重要组成部分

    youdao

  • Security model is based on system security requirements which provide specification for system security requirements and logic structure of security architecture.

    安全模型基于系统安全需求建立模型,用于描述系统的安全需求安全体系逻辑构成

    youdao

  • At the end of this paper, an E-government security system is discussed based on the architecture proposed and the security technologies.

    基于文中安全体系结构现有安全技术,阐述了电子政务安全系统的实现。

    youdao

  • The construction of postal agent insurance computer system is given in brief. Based on service architecture and function, the network architecture, application system and security are demonstrated.

    简单介绍邮政代理保险计算机系统建设情况,以业务结构功能为基础网络结构、应用系统及安全等方面进行了说明。

    youdao

  • The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.

    系统访问控制框架的结构与具体实现方法无关能够满足群应用的不同安全要求以及动态安全性要求的变化。

    youdao

  • The paper summarizes the security threats3G architecture is facing by analyzing the security features of3G security architecture and mobile communications system.

    通过分析3G安全体系结构移动通信系统安全威胁,得出了3G体系结构存在的安全隐患。

    youdao

  • The architecture of system security is built.

    建构了系统安全体系

    youdao

  • The design principle, system design and security strategy of integrative information security and protection architecture are discussed.

    以及一体化信息安全防护体系设计原则、系数设计、管理上的安全策略

    youdao

  • The three-dimension architecture is an integer to keep the security of system, and it will be result in system collapse if one of the dimensions, even one of the factors in one dimension is ignored.

    自成体系,构成了个不可分割整体,共同保障着密钥管理的安全性,忽视其中任何,或任何一维中的某个要素导致密钥管理,乃至整个系统(或平台)在安全性上的致命崩溃

    youdao

  • Methods Using software level defense architecture, partition management, security management, virtual channel technique in communication between partitions etc to ensure the system security.

    方法采用分层防御体系分区管理通道技术、授权管理实现综合化航空电子系统中的数据安全。

    youdao

  • The summary design includes the logical structure of the system design, network architecture, security design, and so on.

    概要设计包括系统逻辑结构设计、网络体系结构安全设计

    youdao

  • Finally, the system security and architecture scalability are discussed and conclusions are reached.

    最后系统安全性系统架构可扩展性进行分析。

    youdao

  • The purpose of the project is analyzing the current status of the information system, finding the limitation, and constructing the security architecture for the information system.

    项目目标目前铁路信息系统现状进行分析找出安全方面的缺陷漏洞,并基础上构造铁路信息系统安全构架

    youdao

  • The network architecture and the security design of the system are also introduced.

    最后介绍系统网络结构网络安全设计

    youdao

  • It first introduced 2g system architecture and the existing security defects.

    首先介绍了2G系统结构及其存在安全缺陷

    youdao

  • So to design the security architecture of power information system, a systematic and structural design method and corresponding computer-aided tools are necessary.

    为此需要一种系统化结构化设计方法以及相应的辅助工具设计电力信息系统安全体系

    youdao

  • With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.

    随着更多应用系统加入到统一认证服务系统将会在教科网信息安全体系发挥重要作用而且网络管理更加简单。

    youdao

  • This paper introduces a new architecture for database encryption system and the way to implement it, gives its main module. Some security problems and performance of this system are discussed.

    提出一种数据库加密系统实现结构方法给出主要功能模块相关的安全问题性能进行了讨论。

    youdao

  • The scheme was based on the public key infrastructure(PKI) architecture with system security achieved by various means such as random numbers, salt, and multiple round iterations.

    方案基于公钥基础设施体系架构,采用了随机数、“多轮迭代手段保证系统的安全性,并且通过在客户端进行密钥生成和加解密操作的方式实现了系统的可扩展性。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定