要限制角色可以访问的一个维度的多维数据集和成员,需要设计和部署一个安全模型。
To limit the cubes and members of a dimension that a role can access, you need to design and deploy a security model.
为了保护患者隐私,PODS的设计采用一个多级安全模型。
To safeguard patient privacy, the PODS design USES a multilevel security model.
由于安全模型依赖于多维数据集模型,应该首先设计和部署多维数据集模型。
Because the security model depends on the cube model, you should design and deploy the cube model before designing and deploying the security model.
在一定程度上,由于使用DOM模型是实现规范化最简单的一种方法,因此XML安全性库都被设计为操作XML的DOM表示。
Partly because canonicalization is most easily implemented using a DOM model, the XML security libraries are all written to work with DOM representations of XML.
理解设计和部署安全模型的步骤。
Understanding the steps to design and deploy a security model.
LotusNotes还提供一个应用程序开发环境,其中已经建立了一个设计并跨企业部署应用程序的安全模型。
Lotus Notes also provides an application development environment with an established security model to design and deploy the application across the enterprise.
安全模型设计结束后,您可以将它导出到一个文件,以便稍后使用AdministrationConsole 导入。
When you are finished designing your security model, you can export it to a file for import later using the Administration Console.
武装人员在袭击之前,利用“Google地球”制作了袭击目标的三维模型,设计了最佳的进出路径、防守位置以及安全岗位。
Before the assault they had used Google Earth to explore 3-d models of the target and determine optimal entry and exit routes, defensive positions, and security posts.
DARPA还想研究项目模型,允许开发者在安全性、可靠性、功效和性能方面更轻松地设计。
DARPA also wants to study programming models that allow developers to more easily design in security, dependability, power efficiency and high performance.
正如您所看到的,与尝试对基于角色的安全模型进行修改来适应其设计时并未考虑的情况相比,这显然是更为灵活的解决方案。
As you can see, this is clearly a more flexible solution to the problem than is trying to bend a role-based security model to fit a situation that it was not designed to handle.
实际上,设计者们决定要设计一个全新的安全模型。
In fact, they decided to include a whole new security model.
基于我们提出的信息安全模型,设计了电子印章系统。
Based on our systemic model of information security, we design an electronic seal system.
对优化后的模型进行了安全校核,验证其完全满足设计要求。
The safety checking validate that the optimized model satisfies the design requirements.
因此,需要设计更为完善的安全模型。
Therefore, it is necessary to design more excellent Peer-to-Peer network security model.
基于我们提出的信息安全模型,设计并实现了一个基于该模型的电子政务信息安全系统。
Based on our systemic model of information security, we design and implement a secure E-government information system.
本文对通信系统中一类直接传输式的信息传输模型进行了安全可靠性设计。
This paper designs security and reliability on a type of information direct transmission model in communication systems.
利用激光在皮肤中的传导及应用红外传感器探测皮肤温度的原理,设计激光美容手术温度控制模型,控制激光手术安全。
Utilize the theory of laser conducting among skin and use infrared sensor to detect the skin temperature, design the laser operation temperature control model to improve the safety of laser operation.
介绍了统一身份认证平台的设计,分析了统一身份认证平台的模型以及安全等相关问题。
This article described a unified authentication platform for design, analysed, a unified platform for identity authentication model and security related issues.
因此,本文主要分为两个重要的组成部分:信息系统的风险分析和管理过程及基于RBAC的安全模型设计。
So the article mainly consists of two parts: the Information System Risk Analysis and security Management and the design of the security model based on the RBAC.
基于此模型,我们设计并实现了一个安全电子政务信息系统。
Based on the model, we design and implement a secure E-government information system.
第4章主要介绍了基于该安全模型的协同商务平台数据交换系统的设计。
In Chapter 4, the design of the data exchange system of Collaborative Commerce Platform based on the security model is discussed.
基于此模型,设计并实现了一个安全电子政务信息系统。
Based on this model, we design and implement a safety electronic politics information system.
本文在构建安全跟车模型的基础上,设计了系统构成。
Base on the mathematic model of automobile safe following distance, the hardware and software of the system are built.
以此安全模型设计的系统安全管理,结构简洁、管理方便,可操作性好。
By this security model designing system safety management, the structure is succinct, the management is convenient, the feasibility is good.
通过分析r BAC模型结构,提出并设计实现了统计管理系统中数据库安全访问控制的新方法。
A novel method for designing and implementing database safe access control in a statistic management system is proposed on the basis of analyzing RBAC model.
在标准模型下设计高效可证明安全的签名方案具有现实意义。
To design a signature scheme which are efficient and provably secure in the standard model is suitable for applications.
第三部分提出了一种基于P 2 P的安全资源共享以提高P 2 P安全性的设计模型。
In the third one, the design model based on the sharing technology of the security resources is setup in order to improve the P2P security.
采用有限元数值模型与实验模态分析相结合的方法,寻求动力安全设计的基本方法。
Using the synthetic method of both finite element and modal analysis searches after a basic way of dynamic Safety design.
详细分析设计系统功能,并构建了系统实现安全管理的逻辑模型、拓扑模型以及安全认证模型。
It analyzes and designs the system's function module, moreover constructs the logic model, topology model and safety authentication model.
本文中所设计的网络安全监测模型,以当今流行的入侵检测技术为主要方法,采用实时的基于NIDS的技术。
The model of the network security monitor system discussed in the thesis USES the popular intrusion detection technology as the main method, and adopts the technology based on real-time NIDS.
应用推荐