• SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.

    SCA单个服务集合业务解决方案的组装提供了一个模型控制解决方案的各个方面,访问方法安全。

    youdao

  • Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.

    LotusNotes服务实例包括Domino安全模型(Security Model),可以进行用户身份验证访问控制加密

    youdao

  • To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.

    为了应对挑战,Max同事一起,以分布式信息流控制(DecentralizedInformation Flow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume

    youdao

  • Before you import the file containing your security model, import the file containing your cube model into the InfoSphere Warehouse control database using the Administration Console.

    导入包含安全模型文件之前使用Administration Console将包含多维数据集模型的文件导入InfoSphereWarehouse控制数据库

    youdao

  • A security and access control model that distinguishes between these two classes of users.

    区分上述用户安全和访问控制模型

    youdao

  • The research of access control model is a topic of information security area.

    访问控制模型信息安全领域研究重点之一。

    youdao

  • Task based access control (TBAC) is an initiative security model, where task is focus of work and dynamic authorization is used.

    基于任务授权控制TBAC)则是以任务为中心,采用动态授权主动安全模型

    youdao

  • So beneath this security attacking model of inner-mesh, we have to get more special security control management for all the component points and participants.

    因此,在这样一个模型下,必须内网所有实体对象进行更加全面、颗粒度更小的安全管理以及控制

    youdao

  • Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.

    多级安全数据库安全策略需要各种模型表达访问控制模型其中之一

    youdao

  • Supported by a National 863 project, implementing flexible, security and effective model as objective, research on access control for XML documents is conducted in this paper.

    本文国家863项目支持下,以实现灵活安全而且高效模型目标,对面向XML文档访问控制进行了全面的研究

    youdao

  • The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.

    访问控制模型技术研究工作流系统安全机制核心,也是信息安全领域的一个热点问题。

    youdao

  • Perfect security system, Using flexible Role-Based Access Control model to build flexible Role-Based Access Control system.

    完善的安全体系采用灵活的基于角色访问控制模型实现灵活的访问控制体系。

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • The implement of the model depends on a message processing security model and an access control model.

    模型依赖于消息安全处理模型访问控制模型。

    youdao

  • RBAC model is the most popular access control strategy because of its flexibleness, convenience and security.

    RBAC模型具有灵活性方便性安全性特点,因此成为访问控制策略的首选。

    youdao

  • Task based Access Control Model is task centered and offers dynamic authorization , so it belongs to the active security model.

    基于任务访问控制模型一种任务为中心,采用动态授权主动安全模型。

    youdao

  • Proposes the model of optimal preventive control based on voltage security in electricity markets.

    给出电力市场环境下基于电压安全的最预测控制模型算法。

    youdao

  • P2P model on the IPV6 can solve problem of security and control in the network finally.

    IPV 6P 2 P模式最终解决网络安全管理问题

    youdao

  • This passage bulids a secure control model with three layers on the ERTDB security requirements firstly, and then proposes a secure optimistic concurrency control strategy.

    首先在分析嵌入式实时数据库安全要求基础给出了一个安全控制模型

    youdao

  • Propose an object-oriented and formal access control model for developers to design security mechanism of systems and for users to perform their duties securely and efficiently.

    采用对象技术提出了一个通用的访问控制模型,提供应用级访问控制机制安全管理方法。

    youdao

  • Using the software EUROSTAG, overspeed protection control model was set up and the effect of OPC on power system security and stability was researched.

    应用仿真软件EUROSTAG模块自定义功能建立了带有超速保护的调速系统模型通过仿真研究了超速保护控制电力系统安全稳定影响

    youdao

  • Traditional access control models, including MAC model and DAC model, have no longer been able to meet the security need of contemporary systems.

    传统访问控制模型——MAC模型DAC模型,远不能满足当代系统安全需要

    youdao

  • The thesis dissertates access control policies and access control implementations, analyzes military security model and object protection in databases.

    本文讨论了存取控制策略实现方法分析了军用安全模型数据库中的对象保护技术。

    youdao

  • The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.

    系统访问控制框架的结构与具体实现方法无关能够满足群应用的不同安全要求以及动态安全性要求的变化。

    youdao

  • This model can resolve various security problem of current applications, and can be extended to an access control model for the different domains.

    模型可以很好地解决现在一些系统存在安全问题并且可以扩展成多域之间的安全互访问模型。

    youdao

  • This security mechanism can effectively improve the ability of access control model to detect and control a pseudo-user.

    安全机制有效提高访问控制模型冒充用户访问的检测控制能力

    youdao

  • It unifies the description of policy elements and security rules to support a wide range of access control model, which shows better generality.

    统一描述策略元素安全规则支持多种访问控制模型体现良好通用性

    youdao

  • This paper takes heading multiple area automatic commerce system (HDPOS5) for example, applied the improved base on position and role access control model to system, ensure the security of the system.

    本文以海鼎业态商业自动化系统(HDPOS5)改进基于岗位角色访问控制模型应用该系统中,更好的保证系统的安全性

    youdao

  • This paper takes heading multiple area automatic commerce system (HDPOS5) for example, applied the improved base on position and role access control model to system, ensure the security of the system.

    本文以海鼎业态商业自动化系统(HDPOS5)改进基于岗位角色访问控制模型应用该系统中,更好的保证系统的安全性

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定