• 提供了通过策略实现的服务安全访问控制

    Secure access control for services using policies is also provided.

    youdao

  • 文件安全访问控制银行自动柜员机安全核心部分

    File security access control is the core of the bank automatic teller machine security.

    youdao

  • 基于一点外汇市场系统网络安全访问控制技术显得更加重要

    On this point, the technology of network safe access control in the exchange transaction becomes more important.

    youdao

  • 本文主要讨论如何利用现代密码技术实现分布式系统中的安全访问控制

    It is mainly discusses that how to use modern cryptographic technology to achieve secure access control in distributed systems.

    youdao

  • 针对P 2 P网络应用环境特点,提出一种分布式安全访问控制模型

    We design a distributed access control model according to the character of the P2P networks.

    youdao

  • 传统RBAC访问控制模型已经不能表达复杂工作流安全访问控制约束

    The traditional RBAC model cannot express complicated workflow secure access control constraint.

    youdao

  • 目前针对IP安全访问控制问题的解决方案只是实现了对组播接收者的访问控制

    The current secure access control techniques in IP multicast just implemented the access control to multicast receivers.

    youdao

  • 随着信息技术风力发电中的应用风电场SCADA系统安全访问控制变得越来越重要

    With the application of information technology in wind power generation, secure access control of SCADA system for wind power farm becomes more and more important.

    youdao

  • 文中角色、角色继承授权等方面分析了如何利用RBAC实现XML文档安全访问控制

    This paper analyzes how to realize secure access control for XML documents using RBAC from aspects of role, role hierarchy, authorization, etc.

    youdao

  • 通过分析r BAC模型结构,提出并设计实现统计管理系统数据库安全访问控制方法

    A novel method for designing and implementing database safe access control in a statistic management system is proposed on the basis of analyzing RBAC model.

    youdao

  • 本文提出一种将PK I技术RBAC技术相结合的方案,实现基于身份认证的安全访问控制

    This paper has presented a scenario that using PKI technology to RBAC and implicating the PKI makes security authorized access control.

    youdao

  • 最后使用此策略构造了一个基于属性证书授权访问控制模型,能够灵活方便实现电子政务中的安全访问控制

    At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.

    youdao

  • 本文从理论上研究了RBAC概念模型,并传统安全访问控制相比较论证了在企业信息系统中采用RBAC的必要性

    We analyze RBAC concept model, compare it with traditional access control scheme, and demonstrate the necessity of implement RBAC in Enterprise Information Systems.

    youdao

  • 角色的安全访问控制模型基础提出了基于角色控制安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户

    And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.

    youdao

  • 存在几种不同安全领域每个领域都不同访问控制限制

    There will be several different security domains, each of which have different access controls and restrictions.

    youdao

  • 这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    youdao

  • 使可以安全访问控制远程数据中心所有服务器路由器交换机电源设备,让您能够纠正问题

    It enables you to rectify the problem by providing you with secure access to and control of all servers, routers, switches, and power devices in your remote data centers.

    youdao

  • 不过不必担心安全问题因为文件系统访问控制机制通常都可以提供充分保护

    However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.

    youdao

  • 某些文件系统支持高级安全特性比如访问控制列表(acl)。

    Some file systems support advanced security features, such as access control lists (ACLs).

    youdao

  • 访问控制规则配置安全规则。

    Rules for access control are configured as Security Rules.

    youdao

  • 服务器需要查询语法选择操作完整实现以及为了数据安全需要访问控制事务支持功能。

    The server side requires a complete implementation of the query syntax, selection as well as access control and transaction support required to expose the data safely.

    youdao

  • 安全策略用于访问控制检查JVM运行时执行的。

    The security policy is used for access control checks, which are performed by the JVM at runtime.

    youdao

  • 传输层安全消息安全、入侵保护身份认证访问控制——安全的确一等公民而且网关证书证实这一点

    Transport-layer security, message-layer security, threat protection, identity and access control – security is truly a first class citizen, and the gateways have the certifications to prove it.

    youdao

  • 例如需要使用网络安全加密令牌控制ejb访问

    For example, you need to control access to EJBs using a network-safe encrypted token.

    youdao

  • 除了简单地提供商务逻辑之外,应用程序必须支持访问安全控制数据持久化事务其它进阶功能

    Beyond simply providing business logic, applications must support secure access, persistence of data, transactional behavior, and other advanced features.

    youdao

  • OmniFind可以配置文档安全令牌访问控制列表关联

    OmniFind can be configured to associate documents with security tokens or access control lists.

    youdao

  • 包含针对所有Cognos对象安全名称空间信息以及访问控制策略

    It also contains security namespace information and access control policies on all the Cognos objects.

    youdao

  • WebSphereApplicationServer安全基础结构比如基于角色访问控制加密

    Security infrastructure of WebSphere Application Server, such as role-based access control and encryption.

    youdao

  • 例中cglib2aopproxy创建安全bean访问控制所需代理对象

    In this case, the Cglib2AopProxy class creates the proxy objects you will need to control access to your secure beans.

    youdao

  • 相比之下授权系统用来决定已通过认证某个特定用户访问系统控制安全资源访问级别一种机制

    Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定