今年几起严重的客户和雇员资料泄漏事件使得管理者们匆忙仔细检查他们复杂的信息系统和业务流程,以寻找可能存在的安全隐患。
Several massive leakages of customer and employee data this year have left managers hurriedly peering into their intricate IT systems and business processes in search of potential vulnerabilities.
人工执行者在当业务流程被建模的时候出现,同时在模型中也会展示系统的其它方面,比如管理与安全等。
Human actors appear when business processes are modeled, and also in models showing other aspects of the system, such as management and security.
它可以进行安全智能的信息获取,并且将该信息自动地整合进业务流程中。
It enables secure and intelligent information capture, and automated integration of this information into business processes.
第二个安全漏洞与攻击者借助用户可管理数据来控制业务流程有关。
The second vulnerability has to do with using user-controllable data to control a business process.
事件在当业务流程被建模的时候出现,同时在模型中也会展示系统的其它方面,比如管理与安全等。
Events appear when business processes are modeled, and also in models showing other aspects of the system, such as management and security.
SecurityIncidentCoopA访问远程业务流程和检索安全事故人工任务的一组就绪或活动实例。
SecurityIncidentCoopA accesses the remote business process and retrieves a list of ready or otherwise active instances of security incident human tasks.
SecurityIncidentPortlet访问远程业务流程和检索安全事故任务的一组就绪或活动实例。
SecurityIncidentPortlet accesses the remote business process and retrieves a list of ready or otherwise active instances of security incident tasks.
您还应该了解现有的各种企业组件,如安全机制、业务流程和业务规则引擎、工作流引擎和打包的应用程序。
You should also be aware of existing enterprise components, such as security mechanisms, business process and business rules engines, workflow engines, and packaged applications.
图8显示了使用业务流程和策略管理组件为企业的业务应用程序提供业务安全服务的业务应用程序服务。
Figure 8 shows the business application services that use the business process and policy management component to provide business security services to the business applications of the enterprise.
组织需要从分层的安全模型转到全局安全模型上来,其中包含了业务流程、用户与系统,他们共同作为整个安全响应模型的组成部分。
The organizations have to move from a layer specific security model to a holistic one which includes business processes, users and systems as part of the overall security response model.
业务流程和策略管理组件使用了下面的安全组件,以实现它对业务应用程序的安全职责。
The business process and policy management component USES the following security components to fulfill its security obligations to the business applications.
很多SOA实现在架构的几个层级都要求技术专家:业务流程、业务规则、数据服务、安全等。
Many SOA implementations require technology expertise in several layers of the architecture: business processes, business rules, data services, security, etc.
本文还将向您介绍如何配置门户组件(包括安全性),以及如何将其与业务流程引擎集成。
It shows you how to configure and integrate portal components (including security) with the business process engine.
使用RFID intheSupplyChain引领您的组织走向未来,其中解释了业务流程、操作和实现问题、风险、漏洞,以及安全性和隐私。
Bring your organization into the future with RFID in the Supply Chain, which explains business processes, operational and implementation problems, risks, vulnerabilities, and security and privacy.
UserRoleProvisioning:这是一个应用程序或组件,处理用户角色安全与业务流程的映射,产生一个具有人工任务角色映射的版本化流程模板。
User role Provisioning: This is an application or a component that handles user role security mapping with a business process, resulting in a versioned process template with human task role mapping.
业务流程编排,特别是HumanTaskManager需要启用安全性;仅在进行测试时支持禁用全局安全性的情况。
Business Process Choreographer and (especially) Human Task Manager require security to be enabled; scenarios with disabled global security are supported for test purposes only.
在介绍SET协议的业务流程的同时,着重对SET协议中的安全机制作了全面分析。
This paper introduces the business flow of SET protocol, meanwhile puts forth effort to analyze its secure mechanism.
然后对某市财政信息系统的业务流程及其安全现状进行了分析,提出了一种适合于财政行业的安全审计解决方案。
First, the concept and status of security audit is introduced briefly, it shows the importance of security audit. Then, it studies the business processes and network safty status of Financial M…
然后对某市财政信息系统的业务流程及其安全现状进行了分析,提出了一种适合于财政行业的安全审计解决方案。
First, the concept and status of security audit is introduced briefly, it shows the importance of security audit. Then, it studies the business processes and network safty status of Financial M…
应用推荐