Generally, developers don't expect the mobile cloud to be free from security threats any more than they expect that of any other information technology (it) model used to support business.
通常,开发人员不认为移动云能免受安全威胁,就如同他们不认为其他任何信息技术(IT)模式能支持业务一样。
We first analyse the security threats that authentication of DBMS must face and introduce a security threat model.
本文首先分析了数据库身份认证系统的安全威胁,提出一个安全威胁模型。
In the third part, the paper emphasizes the study of information security risk quantification assessment model based on assets, threats and weaknesses.
第三部分,论文着重研究了一种基于资产、威胁和弱点的信息安全风险评估量化模型。
We first analyse the security threats that DBMS must face and introduce a security threat model.
本文首先分析了数据库管理系统可能面临的各种安全威胁,引入了一个安全威胁模型。
A relevant Content Lifecycle Protection Model (CLPM), which divides the whole lifecycle protection of digital content into 4 phases, is provided to deduce the security threats in each phase.
基于该保护理念作者提出了相应的保护模型CLPM,该模型从四个阶段分析壳对数字内容的保护过程,有针对性的解除不同阶段面临的威胁。
A relevant Content Lifecycle Protection Model (CLPM), which divides the whole lifecycle protection of digital content into 4 phases, is provided to deduce the security threats in each phase.
基于该保护理念作者提出了相应的保护模型CLPM,该模型从四个阶段分析壳对数字内容的保护过程,有针对性的解除不同阶段面临的威胁。
应用推荐