• We briefly described the DB2 architecture, background processes, memory model, security, tools, and so on.

    我们简要地描述DB 2架构后台进程内存模型安全性工具等方面。

    youdao

  • You model domain architecture views, such as Applications, Infrastructure, Networks, and Security, by creating ABBs to describe enterprise-critical system composition and behavioral patterns.

    通过创建ABB描述企业关键系统组成行为性模式可以为架构视图建模例如应用基础设施(Infrastructure)、网络安全

    youdao

  • It's important to understand the current security model, user roles, permissions and capabilities of the application. The following points helps in evaluating the maturity of security architecture.

    重要的是理解当前安全模型用户角色权限应用程序功能

    youdao

  • The rules in the new model are reasonable and secure by analysis, and will rise the positive effect to design information security architecture model.

    分析表明模型定义规则合理的、安全信息安全体系结构模型的构建起到积极作用

    youdao

  • The security model of the trusted network architecture (TNA) is used for making effective integration and management of the security resources of the existing network.

    可信网络架构安全模型针对用户现有网络安全资源进行有效整合管理的。

    youdao

  • Security model is based on system security requirements which provide specification for system security requirements and logic structure of security architecture.

    安全模型基于系统安全需求建立模型,用于描述系统的安全需求安全体系逻辑构成

    youdao

  • The model can be used to guide the establishment of security architecture and security standards architecture.

    模型可以用于指导特定安全体系结构制定以及指导安全标准体系的制定。

    youdao

  • To meet this security requirement, this paper mainly discusses the trusted Computing technology and proposes a trusted platform model and architecture to guarantee the s is running under expectations.

    针对应用背景,本文主要探讨利用可信计算达到系统运行可信目标,研究保障系统安全运行的可信平台模型体系结构

    youdao

  • The function of Trusting Model For Network Security Architecture was discussed, and three primary Trusting Models was present also.

    讨论了安全体系结构信赖模型作用以及三种常见的安全信赖模型

    youdao

  • The role specification AC and role assignment AC are introduced, the role-based PMI architecture and the role-based PMI security model for E-government is discussed and researched in the paper.

    论文介绍了角色规范属性证书角色指派属性证书,讨论了基于角色的PMI体系结构,探讨了基于角色PMI的电子政务安全模型

    youdao

  • This dissertation is based on the analysis of common architecture of active network and the security problems of SENCOMM, and discusses its hidden dangers, needs and trusts model.

    本文基于主动网络通用体系SENCOMM安全缺陷分析探讨安全隐患需求信任模型

    youdao

  • The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.

    系统访问控制框架的结构与具体实现方法无关能够满足群应用的不同安全要求以及动态安全性要求的变化。

    youdao

  • The author focuses on presenting the security architecture model of IP layer and practicing under this model in this paper.

    本文的目的在于提出IP安全体系结构模型并用此模型去指导IP层安全实践。

    youdao

  • The depender graph trust model has good redundancy, and weakening the security of single CA will have not effect on the whole trust architecture seriously.

    依赖信任模型具有很好的冗余性单个CA安全性削弱整个信任体系不会造成很大影响

    youdao

  • And the model of general security architecture is provided.

    在此基础上提出了通用安全体系结构模型

    youdao

  • On the basis of the work above, this paper presents a brief overview of the basic theory and architecture of system security engineering capability maturity model(short for SSE-CMM).

    基础提出了基于能力成熟模型安全过程方法 ,介绍了系统安全工程能力成熟模型 (SSE CMM)基本思想体系结构

    youdao

  • On the basis of the work above, this paper presents a brief overview of the basic theory and architecture of system security engineering capability maturity model(short for SSE-CMM).

    基础提出了基于能力成熟模型安全过程方法 ,介绍了系统安全工程能力成熟模型 (SSE CMM)基本思想体系结构

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定