各个中介模式被适当地放在中介流中以实现预期的交互目标,以及执行管理和安全策略。
Individual mediation patterns are placed appropriately in the mediation flow to achieve the goals of the intended interaction as well as to enforce management and security policies.
内容和门户管理员必须使用内容属性和元数据(包括用于安全策略的内容属性和元数据)标识所有内容。
All content must be tagged with content attributes and metadata, including those for security policies, by content administrators and portal administrators.
云安全策略主要关注用户管理、数据保护和虚拟机保护。
A cloud security policy focuses on managing users, protecting data, and securing virtual machines.
治理和风险管理提供了在更大的SOA环境中实现和强制执行安全策略的机制。
Governance and risk management provide the mechanism to implement and enforce security policies within the larger SOA environment.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
用户可以在安全策略中创建两种类型的规则,从而防止泄露事件数据和管理数据。
There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.
精心制定的安全策略应该描述云计算服务的使用者和提供者应该做什么;它可以让提供者减少很多管理时间。
A carefully crafted security policy Outlines what cloud computing service consumers and providers should do; it can save providers many hours of management time if they develop a security policy.
服务安全性的重点是管理联合标识和跨服务的访问控制、确保能安全访问服务和应用程序,以及使服务的安全策略得到一致执行。
Service security focuses on managing the federated identity and access control across services, securing access to services and applications, and consistently enforcing security policies for services.
安全策略管理:负责确保整个企业一致地定义和管理安全策略。
Security policy management: Responsible for ensuring that the security policies are consistently defined and managed across the enterprise.
sugroup提供一种在系统上实现和管理安全策略的方法。
Sugroups provides one method of implementing and managing the security policy on your systems.
可以开发Web服务安全策略应用程序来让系统管理员为具有不同角色和职责的用户自定义设置。
You can develop a Web services security policies application to allow the system administrators custom the settings for users with different roles and responsibilities.
本文重点以本人所在单位后勤装备信息管理系统的设计过程为实例,详细分析了系统的整体方案设计和安全策略设计。
I mainly take the process of design as example which is the system of logistic equipment information management in my own workplace, analyse the system whole design safety carefully.
阐述企业办公自动化系统的重要性,使用中的安全隐患,以及应该采取的安全策略:安全防范手段、安全管理和安全认证。
To expound OA system of enterprise is important, safety hidden trouble in use, ought to adopt safety strategy: safety keeping away means, safety manage and safety authentication.
该软件允许一个安全管理来定义用于为一个用户或者一组用户的计算机设备和计算机设备组的安全策略。
It allows a security manager to define security policy for computer devices or groups of computer devices for a user or a group of users.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
本文基于安全策略的分层管理模型,提出了一个集目标求精和实体求精为一体的安全策略逐级求精算法。
Integrated with goal refinement method and entity refinement method, an algorithm of policy refinement is proposed in this paper on the basis of layered-policy model for security policy.
用于任意自动化系统的这项基本安全策略用于管理用户和网络进入系统以保护控制器收到攻击。
The basic security strategy for any automation system is to manage user and network access to the system to protect the controller from attack.
信任管理体系是一种能综合处理信任状、信任关系和安全策略,直接实现授权,且更高效、更完善的分布式授权方式。
Trust management is a better and more efficiency authorization mechanism which deals with the credentials, security policies and trust relationships integrated, and do authorization directly.
管理员和开发人员可以定义自定义证据,并可通过扩展安全策略来识别和使用该证据。
Administrators and developers can define custom evidence and extend security policy to recognize and use it.
安全的接入管理应该能够确保用户在接入时满足终端安全策略的要求即通过健康体检,并且一旦出现健康状况不满足安全策略时即被限制访问和要求修复。
Network access management should ensure that terminals pass the security examination. Once terminals 'healthy condition does not meet the security policy, it should be restricted and repaired.
还从管理和技术两个方面对高校网络系统的安全体系作了进一步论述,并提出了高校网络系统的安全策略、安全设计的原则和措施。
Also, the article discusses the security architecture of the network system, and gives some security policies, principles and measures for the network system in universities.
还从管理和技术两个方面对高校网络系统的安全体系作了进一步论述,并提出了高校网络系统的安全策略、安全设计的原则和措施。
Also, the article discusses the security architecture of the network system, and gives some security policies, principles and measures for the network system in universities.
应用推荐