Traditional single security technology is becoming obsolete with the complexity of network security problems increased. To address this problem, a new security system architecture is proposed.
针对单一的网络安全技术已经无法很好的解决日益复杂的网络安全问题,提出了一种新型的安全系统。
You should use the best practices in conjunction with security best practices and policies that are in place at other levels in your system architecture to ensure a comprehensive secure solution.
您应该将这些最佳实践与系统架构中其他级别上的安全最佳实践和策略结合使用,以确保获得完善的安全解决方案。
After three architecture reviews, it was clear that there were issues in the system design concerning performance, security, and management.
在体系结构复查之后,系统设计中存在有关性能、安全性和管理的问题就变得明显了。
Security can be applied at different levels of a system architecture.
可在系统架构的不同级别上应用安全性。
Beneath all the capabilities of the WebSphere Integration Reference Architecture are the management services for security, directory, system management, and resource virtualization.
位于WebSphereIntegrationReferenceArchitecture的所有功能之下的是安全性、目录、系统管理和资源虚拟化的管理服务。
You model domain architecture views, such as Applications, Infrastructure, Networks, and Security, by creating ABBs to describe enterprise-critical system composition and behavioral patterns.
通过创建ABB以描述企业关键系统组成与行为性的模式,您可以为域架构视图建模,例如应用、基础设施(Infrastructure)、网络和安全。
The security architecture is made of a security gateway and an operating system library which tags data as it is being used by the web application.
整个安全架构由一个安全网关和一个操作系统库组成,Web应用可使用该操作系统库标记数据。
This paper presents the bluetooth security architecture, expounding the security system of the link layer and application layer.
本文对蓝牙技术的安全结构作了描述,详细介绍了蓝牙链路层和应用层的安全机制。
With the advent of 3g mobile systems a serious effort has been made to create a consistent security architecture based on the threats and risks a 3g system faces.
随着第三代移动通信系统(3G)的出现,需构建一个能够解决3g将要面临的各种安全威胁的和谐同一的安全结构体系。
The improvement of information system security must start with architecture.
提高信息系统安全必须从体系结构着手。
Based on talking about cryptography architecture of RMS, this thesis analyses security of RMS and points out problems that should be noticed for building high-level Rights Management System.
文章在介绍RMS密码架构的基础上,对其安全性进行分析,并指出构建更高强度的权限管理系统应注意的问题。
Intrusion detection system (IDS) is the key component of the architecture of information security.
入侵检测系统(IDS)是信息安全体系结构的重要组成部分。
Security model is based on system security requirements which provide specification for system security requirements and logic structure of security architecture.
安全模型是基于系统安全需求建立的模型,用于描述系统的安全需求和安全体系的逻辑构成。
At the end of this paper, an E-government security system is discussed based on the architecture proposed and the security technologies.
基于文中的安全体系结构和现有安全技术,阐述了电子政务安全系统的实现。
The construction of postal agent insurance computer system is given in brief. Based on service architecture and function, the network architecture, application system and security are demonstrated.
简单介绍了邮政代理保险计算机系统的建设情况,以业务结构及功能为基础,对网络结构、应用系统及安全等方面进行了说明。
The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.
该系统的访问控制框架的结构与具体实现方法无关,能够满足群应用的不同安全要求以及动态群对安全性要求的变化。
The paper summarizes the security threats3G architecture is facing by analyzing the security features of3G security architecture and mobile communications system.
通过分析3G安全体系结构和移动通信系统的安全威胁,得出了3G体系结构存在的安全隐患。
The architecture of system security is built.
建构了系统安全体系。
The design principle, system design and security strategy of integrative information security and protection architecture are discussed.
以及一体化信息安全防护体系的设计原则、系数设计、管理上的安全策略。
The three-dimension architecture is an integer to keep the security of system, and it will be result in system collapse if one of the dimensions, even one of the factors in one dimension is ignored.
这三维自成体系,构成了一个不可分割的整体,共同保障着密钥管理的安全性,忽视其中任何一维,或任何一维中的某个要素,都将导致密钥管理,乃至整个系统(或平台)在安全性上的致命崩溃。
Methods Using software level defense architecture, partition management, security management, virtual channel technique in communication between partitions etc to ensure the system security.
方法采用分层防御体系、分区管理、虚通道技术、授权管理等来实现综合化航空电子系统中的数据安全。
The summary design includes the logical structure of the system design, network architecture, security design, and so on.
概要设计包括系统逻辑结构设计、网络体系结构与安全设计等。
Finally, the system security and architecture scalability are discussed and conclusions are reached.
最后,对系统安全性和系统架构可扩展性进行分析。
The purpose of the project is analyzing the current status of the information system, finding the limitation, and constructing the security architecture for the information system.
项目的目标是对目前铁路信息系统现状进行分析,找出安全方面的缺陷和漏洞,并在此基础上构造铁路信息系统安全构架。
The network architecture and the security design of the system are also introduced.
最后介绍了系统的网络结构和网络安全设计。
It first introduced 2g system architecture and the existing security defects.
首先介绍了2G系统结构及其存在的安全缺陷。
So to design the security architecture of power information system, a systematic and structural design method and corresponding computer-aided tools are necessary.
为此,需要一种系统化和结构化的设计方法以及相应的辅助工具设计电力信息系统的安全体系。
With more application systems joining unified identity authentication serve, this system will play a more important role in the CERNET info security architecture. And network management is simpler.
随着更多的应用系统加入到统一认证服务,本系统将会在教科网的信息安全体系中发挥更重要的作用,而且网络管理更加简单。
This paper introduces a new architecture for database encryption system and the way to implement it, gives its main module. Some security problems and performance of this system are discussed.
提出了一种数据库加密系统实现结构和方法,给出了主要的功能模块,对相关的安全问题和性能进行了讨论。
The scheme was based on the public key infrastructure(PKI) architecture with system security achieved by various means such as random numbers, salt, and multiple round iterations.
该方案基于公钥基础设施体系架构,采用了随机数、“盐”和多轮迭代等手段保证系统的安全性,并且通过在客户端进行密钥生成和加解密操作的方式实现了系统的可扩展性。
应用推荐