• This model assumes, like the end to end trust, that a requesting application is known and trusted software.

    信任类似模型假定请求应用程序已知的受信任软件

    youdao

  • The old security model was for it to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle.

    IT安全模型企业网络周围建立一刻巨大的微尘,受信任的、已授权员工穿越守卫严密的吊桥进入众所周知的城堡。

    youdao

  • Under this new model, each user is authorized to use an application's range of functionality according to the degree to which he or she is trusted.

    这种模型下,根据每位用户受信任程度或者授权使用应用程序某一范围功能

    youdao

  • The end to end security model would mean that all providers give access to all trusted requesting applications.

    安全模型意味着所有提供者将授予所有受信任请求应用程序访问权限。

    youdao

  • In the federated network model, each partner in a trusted federation is granted access to the Shared resources.

    联合网络模型中,受信任联合中的每个合作伙伴授权访问共享资源。

    youdao

  • This model supports single sign on by users to trusted applications which are able to make service requests on their behalf.

    模型支持用户登录受信任应用程序后者用户的身份进行服务请求

    youdao

  • This security model allows administrators to restrict access to trusted origins in a very flexible way.

    安全性模型允许管理员一种非常灵活方式限制受信任站点的访问

    youdao

  • In this mode there is almost always a trusted link between the gateway and other parts of the ESB so that the security model required for those other parts of the ESB can be simplified.

    模式中,网关esb其他部分之间几乎总是存在受信任链路因此esb的这些其他部分所需安全模型可以得到简化

    youdao

  • The lack of a database-level security model makes it difficult to fully leverage ZEO storage servers as clients have more or less unfettered access to the database and must therefore be trusted.

    缺乏数据库级别安全模型使得充分利用ZEO存储服务器变得非常困难因为客户拥有数据库自由访问因此客户端必须信任

    youdao

  • If a model cannot be trusted to tell you true things that you want to know about the software system that it represents, then it is worse than useless, since it can lead you to the wrong conclusions.

    如果一个模式不能表示软件系统准确的表现出来,那么不如不用模式,因为可能会导致错误的结论。

    youdao

  • Security header tokens and trusted context are important features to consider when choosing and implementing the security model for your Web services environment.

    Web服务环境选择实现安全模型时,安全报头标记受信任上下文都是重点考虑特性

    youdao

  • We explore the WebSphere II process model and describe the difference between trusted and fenced wrappers; the latter being a prerequisite for exploitation of partitioned database resources.

    我们研究WebSphereII过程模型描述受信任包装设防包装器之间不同后者研究分区数据库资源先决条件。

    youdao

  • The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.

    可信网络架构安全模型针对用户现有网络安全资源进行有效整合管理的。

    youdao

  • To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.

    模型透明计算机系统基础,利用透明计算技术计算机内部安全问题进行控制。

    youdao

  • To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.

    针对应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台模型体系结构

    youdao

  • In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    系统采用了信任机制、基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    youdao

  • The security model is the core content in the trusted information system and the key field of the trusted computing research.

    安全模型既是可信信息系统核心内容,也是可信计算研究重要领域

    youdao

  • The old security model was for IT to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle .

    IT安全模型企业网络周围建立一刻巨大的微尘,受信任的、已授权员工穿越守卫严密的吊桥进入众所周知的城堡。

    youdao

  • This paper introduces a user-oriented secure communication model implemented in network layer for two trusted network nodes.

    网络节点可信安全假设下,提出一种面向用户的网络安全通信模型

    youdao

  • A risk assessment model based on Bayesian network was proposed. In this model, each risk event influencing the Trusted Platform Control Module (TPCM) 's trust was analyzed.

    可信平台控制模块(TPCM)的风险进行了分析,针对其特点和风险定量评估要求,提出基于叶斯网络的TPCM风险评估模型

    youdao

  • The paper analyzes security of UCON model and puts forward the TUCON model based on Trusted Computing Module(TPM).

    主要对UCON模型安全性进行了分析可信计算模块TPM引入UCON模型,构建了基于TPM的使用控制模型——TUCON模型。

    youdao

  • The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.

    比较MTMTPM安全模型区别给出了实现可信机制过程

    youdao

  • To further enhance the safety of BIOS, this paper presented a new trust transition model with Trusted Platform Module (TPM) in Extensible Firmware Interface (EFI).

    进一步提高BIOS安全性提出利用可信平台模块(TPM)可扩展固件接口(efi)中建立可信链的方案。

    youdao

  • At the same time, our company's products get a lot of "utility model patents" and "appearance patents" and are highly trusted by the market and users.

    同时产品荣获多项“实用新型专利外观专利”深受市场和用户信赖。

    youdao

  • At the same time, our company's products get a lot of "utility model patents" and "appearance patents" and are highly trusted by the market and users.

    同时产品荣获多项“实用新型专利外观专利”深受市场和用户信赖。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定