在任务节点中引入RBAC机制对角色属性进行约束以实现对工作流的安全存取控制。
Injecting RBAC mechanism into task nodes to restrict the role attribute can secure the access control of the workflow.
针对工作流建模的复杂性和模型的安全存取控制问题,提出一种通过建立任务节点和路由节点及其依赖关系来创建工作流模型的方法。
Due to complexity of modeling workflow and problems of secure access control, a method that makes a workflow model by setting up task nodes, route nodes and their dependency is brought forward.
世界卫生组织采用一系列技术和安全措施以防范我们系统上所保存信息的丢失、滥用、未经授权的存取或公布、修改或损毁。
WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
您可以提供渐进式安全和存取控管,这样不同的角色和小组只对认为可接受的区域产生影响。
You can provide granular security and access control so that different roles and teams only have influence on areas that are deemed acceptable.
现今的资料存取控制可精细到个别资料格中的资讯,以便为重要资料及机密客户资讯,提供更严密的安全防护。
Access to data can now be controlled down to an individual cell of information, providing greater security for your critical data and sensitive customer information.
档案安全与敏感需求。为了机密、资讯专属性、或法规保护等理由,某些档案的存取必须受到限制。
Records security and sensitivity needs. Some records require limitations on access to them for reasons of confidentiality, proprietary nature of the information or due to legal protections.
可经由与档案所属的营运单位的协商,来进行存取与安全分类的分派。
The access and security classifications may be assigned in consultation with the business unit to which the records belong.
在用户层次结构的动态存取控制问题上,本文提出了一种安全有效的方案。
In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.
这是存取安全使用的范例。
合理的安全与存取有赖于组织的本质与规模,以及需要安全考量的资讯的内容与价值。
Reasonable security and access will depend on both the nature and size of the organization, as well as the content and value of the information requiring security.
在一些最早的存取控制系统中,人们用角色来分隔安全管理和系统管理。
People use it to separate the management of system from security in the access control system.
目前,绝大多数USB接口设备是以明文的形式进行数据的存取与传输,这就不可避免的带来了安全隐患。
At present, most USB interface equipments store and transmit data in plaintext form, unavoidable potential safety menace has been brought.
它具有存取速度快、存储安全、可靠性高、操作使用简便等优点。
It has the advantage of quick access, safe storage, high dependability and simple operations, etc.
协助安全存放所有合同,租约和其他财务记录,包括适当的存放和存取。
Assists in providing safe keeping, including proper storage and access, for all contracts, leases and other financial records.
数据完整性和合法存取会受到很多方面的安全威胁,包括密码策略、系统后门、数据库操作以及本身的安全方案。
Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.
本文提出了一个简单安全的存取控制机制,可以有效地控制移动代理在本地主机的更新及创建权限。
This paper proposed a simple and secure access control mechanism that can effectively control mobile agents updating and creating ability in native host.
改进了安全级比较的规则,使得更适合现实中空间数据存取控制的需求。
Improve the rules of comparing the security label, which meet the practical demand of the Access Control for spatial database.
PK I技术能够有效满足网络应用中的机密性、完整性、真实性及不可否认性和存取控制等安全需求。
PKI can effectively meet many safety requirements for confidentiality, integrality, facticity an acceptability and access control for network applications.
在载入时间,程序码存取安全系统会检查所有原则层级,产生的使用权限授权是每一个层级中所有允许的使用权限的交集。
At load time, the code access security system examines all policy levels and the resulting permission grant is the intersection of all allowed permissions in each level.
外部存储器存取请求首先通过读取相应的安全位来处理。
External memory access requests are processed by first reading the corresponding security bit.
安全性解决方案主要措施有用户验证、页面授权、密码存取数据库和使用存储过程操作数据库。
Security solution includes validating users, page authorization, reading and writing database using the password and manipulating database using store procedures.
与设置用户存取权限控制、冗余备份恢复、网络安全等多种安全策略共同建立有机的安全体系。
Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.
在计算机安全学中,一种对存取受到控制的实体的特征的描述。
In computer security, a description of the characteristics of an entity to which access is controlled.
存取控制机制是保障数据库安全的一种主要手段。
Access control mechanisms are the principal way to protect data.
在计算机安全学中,由于软件或硬件的疏忽引起的错误。这种错误躲过了存取控制进程。
In computer security, an error of omission or oversight in software or hardware that permits circumvention of the access control process.
您的劳动人口需要安全,可靠,快速存取重要的公司数据,如客户记录。
Your workforce needs secure, reliable, fast access to vital company data, such as customer records.
在实际SOS中这三种存取控制方式还能引起安全隐患,必须结合其他的安全措施和方法来提高操作系统的安全性。
There are hidden dangers caused by Access Control in the running SOS, for improving security of the operating system other methods must be combined with.
要实现这个目标,低层次的档案存取,这是可靠的,稳健和故障安全。
This is achieved by low-level file access which is reliable, robust and fail-safe .
要实现这个目标,低层次的档案存取,这是可靠的,稳健和故障安全。
This is achieved by low-level file access which is reliable, robust and fail-safe .
应用推荐