This model assumes, like the end to end trust, that a requesting application is known and trusted software.
和端到端信任类似,此模型假定请求应用程序是已知的受信任软件。
The old security model was for it to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle.
IT旧的安全模型是在企业网络周围建立一刻巨大的微尘,只让受信任的、已授权的员工穿越守卫严密的吊桥墙进入众所周知的城堡。
Under this new model, each user is authorized to use an application's range of functionality according to the degree to which he or she is trusted.
在这种新模型下,根据每位用户受信任的程度,对他或者她授权使用应用程序的某一范围的功能。
The end to end security model would mean that all providers give access to all trusted requesting applications.
端到端安全模型意味着所有提供者将授予所有受信任的请求应用程序访问权限。
In the federated network model, each partner in a trusted federation is granted access to the Shared resources.
在联合网络模型中,受信任的联合中的每个合作伙伴被授权访问共享资源。
This model supports single sign on by users to trusted applications which are able to make service requests on their behalf.
此模型支持用户单点登录到受信任应用程序,由后者以用户的身份进行服务请求。
This security model allows administrators to restrict access to trusted origins in a very flexible way.
该安全性模型允许管理员以一种非常灵活的方式,来限制对受信任站点的访问。
In this mode there is almost always a trusted link between the gateway and other parts of the ESB so that the security model required for those other parts of the ESB can be simplified.
在此模式中,网关和esb的其他部分之间几乎总是存在受信任链路,因此esb的这些其他部分所需的安全模型可以得到简化。
The lack of a database-level security model makes it difficult to fully leverage ZEO storage servers as clients have more or less unfettered access to the database and must therefore be trusted.
缺乏数据库级别的安全模型使得充分利用ZEO存储服务器变得非常困难,因为客户端或多或少地拥有对数据库的自由访问,因此客户端必须受信任。
If a model cannot be trusted to tell you true things that you want to know about the software system that it represents, then it is worse than useless, since it can lead you to the wrong conclusions.
如果一个模式不能把它所表示的软件系统向你准确的表现出来,那么还不如不用模式,因为它可能会导致错误的结论。
Security header tokens and trusted context are important features to consider when choosing and implementing the security model for your Web services environment.
当为Web服务环境选择和实现安全模型时,安全报头标记和受信任上下文都是要重点考虑的特性。
We explore the WebSphere II process model and describe the difference between trusted and fenced wrappers; the latter being a prerequisite for exploitation of partitioned database resources.
我们将研究WebSphereII过程模型,并描述受信任的包装器与设防包装器之间的不同;后者是研究分区数据库资源的先决条件。
The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.
可信网络架构安全模型是针对用户现有的网络安全资源进行有效整合和管理的。
To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.
该模型以透明计算机系统为基础,利用透明计算技术对计算机内部的安全问题进行控制。
To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.
针对这一应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台的模型和体系结构。
In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.
系统中采用了信任链机制、基于角色的访问控制模型、两级日志、可信认证等技术,同时给出了可信在分布式计算机系统中的实现技术和途径。
The security model is the core content in the trusted information system and the key field of the trusted computing research.
安全模型既是可信信息系统的核心内容,也是可信计算研究的重要领域。
The old security model was for IT to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle .
IT旧的安全模型是在企业网络周围建立一刻巨大的微尘,只让受信任的、已授权的员工穿越守卫严密的吊桥墙进入众所周知的城堡。
This paper introduces a user-oriented secure communication model implemented in network layer for two trusted network nodes.
在网络节点可信的安全假设下,提出一种面向用户的网络层安全通信模型。
A risk assessment model based on Bayesian network was proposed. In this model, each risk event influencing the Trusted Platform Control Module (TPCM) 's trust was analyzed.
对可信平台控制模块(TPCM)的风险进行了分析,针对其特点和风险定量评估要求,提出了基于贝叶斯网络的TPCM风险评估模型。
The paper analyzes security of UCON model and puts forward the TUCON model based on Trusted Computing Module(TPM).
主要对UCON模型的安全性进行了分析,并将可信计算模块TPM引入UCON模型,构建了基于TPM的使用控制模型——TUCON模型。
The difference of MTM and TPM on the security model is compared, then the process implementing trusted computing is given.
比较了MTM和TPM在安全模型上的区别,给出了实现可信机制的过程。
To further enhance the safety of BIOS, this paper presented a new trust transition model with Trusted Platform Module (TPM) in Extensible Firmware Interface (EFI).
为进一步提高BIOS的安全性,提出一种利用可信平台模块(TPM)在可扩展固件接口(efi)中建立可信链的方案。
At the same time, our company's products get a lot of "utility model patents" and "appearance patents" and are highly trusted by the market and users.
同时,产品荣获多项“实用新型专利”和“外观专利”深受市场和用户的信赖。
At the same time, our company's products get a lot of "utility model patents" and "appearance patents" and are highly trusted by the market and users.
同时,产品荣获多项“实用新型专利”和“外观专利”深受市场和用户的信赖。
应用推荐