随后建立一个通用的安全工作流系统模型。
在角色的安全访问控制模型的基础上,提出了基于角色控制的安全工作流模型,使文档在工作流引擎的驱动下,在网络环境中流向正确用户。
And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.
您还应该了解现有的各种企业组件,如安全机制、业务流程和业务规则引擎、工作流引擎和打包的应用程序。
You should also be aware of existing enterprise components, such as security mechanisms, business process and business rules engines, workflow engines, and packaged applications.
如果希望实现安全的特殊版本控制工作流,让两个开发人员可以在咖啡馆中通过无线网络一起工作,那么可以试试下面的方法。
If you want to enable a secure, ad-hoc version control workflow, for instance, two guys on a wireless network in a coffee shop, then try out this hack.
分配给用户的角色可以用在定制安全策略的设计和实现中,以及定制的工作流和事件升级流中。
Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.
最后,如果你的信息不够安全,工作流是否有效率就不那么重要了。
Finally, if your information isn't secure and protected, it won't matter how efficient your workflow is.
获得安全策略后,就要定义角色和工作流。
After you've got a security policy, define personae and workflows.
ContentTemplates对象用于存储一组默认值,比如“所有者、作者、工作流和安全特性等”,以便在创建新的内容时使用它们。
Content Templates objects are used to store a set of default values, such as "owner, author, workflow and security features"; to be used when creating new Content.
在执行工作流期间实施属性级的安全措施。
Security on attribute level enforced also during workflow execution.
对于即将出现的业务工作流web服务标准(在该标准中,安全的数据需要流经几个系统才能完成对事务的处理)而言,这很重要。
This is important for the coming wave of business workflow Web services standards where secured data needs to move through several systems for a transaction to be completely processed.
从安全性的角度来看,必须跨所有功能(比如工作流、关系和层次结构管理)实现属性级的特权授权粒度。
From a security perspective, attribute-level granularity of authorization privileges across all functions such as workflow, relationship and hierarchy management must be available for implementation.
基本服务可以与支持工作流、安全性和审计日志记录的通用企业组件集成。
Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.
架构师需要涉及许多问题,从安全性、访问控制和服务水平协议,直到业务工作流、事件处理、信息管理和业务规则。
The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.
除了工作流支持外,本文没有涉及到的另一个重要问题是安全性。
Aside from workflow support, another important issue I didn't consider in this article is security.
XML数据所带来的透明性要求应用程序的处理工作流的透明性也相应增加,从而减少从安全性到状态控制方面的问题。
The increased transparency of XML data requires an increased transparency of application processing workflow in order to mitigate problems from security to state control.
基本服务用于支持安全性和私密性、搜索、审计日志记录和工作流。
Base services are available to support security and privacy, search, audit logging, and workflow.
创建ContentTemplates,以描述Web内容的属性,例如,工作流、安全性和组件属性。
Create the content Templates to describe the attributes for your Web content, e.g workflow, security and component attributes.
该文将安全性和高效性原则应用到迁移工作流的迁移决策中。
The thesis applies the security and efficiency rule to the migrating decision in migrating workflow.
在任务节点中引入RBAC机制对角色属性进行约束以实现对工作流的安全存取控制。
Injecting RBAC mechanism into task nodes to restrict the role attribute can secure the access control of the workflow.
访问控制机制是分布式工作流系统安全策略中的核心内容。
Access control mechanism is an increasingly important content in security policy of distributed workflow management system.
笔者首先分析了PD M中审批工作流存在的信息安全问题。
Firstly, the information security problems of checkup workflow in PDM are discussed.
系统开发涉及身份验证、数字签名与传输加密、工作流定义、审批应用、电子签章和痕迹跟踪等关键安全技术。
Many key security technologies are involved, such as ID authentication, digital signature and transfer encryption, workflow definition, accreditation application, electronic seal and trail trace.
传统的RBAC访问控制模型已经不能表达复杂的工作流安全访问控制约束。
The traditional RBAC model cannot express complicated workflow secure access control constraint.
当前的工作流并不很安全。
基于对业务活动的可调度性分析,提出了时序一致性验证方法,确保工作流执行中活动之间时间交互的安全性。
Based on analyzing the schedulability of business activities, a time consistency verification method is put forward to assure safe time interactions between activities during workflow executions.
可采用单点登陆、PKI认证、授权、基于角色的权限分配策略、利用应用网关访问资源,开发适合本系统的工作流访问机制等措施确保信息平台的安全。
The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.
针对工作流建模的复杂性和模型的安全存取控制问题,提出一种通过建立任务节点和路由节点及其依赖关系来创建工作流模型的方法。
Due to complexity of modeling workflow and problems of secure access control, a method that makes a workflow model by setting up task nodes, route nodes and their dependency is brought forward.
访问控制模型与技术的研究是工作流系统安全机制的核心,也是信息安全领域的一个热点问题。
The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.
证明结果表明,该密钥封装结构方案能够达到密码工作流模式下要求的接收者安全和外部安全。
The proposed scheme can satisfy the receiver security and the external security characters in cryptographic work.
但在工作流带来高效率的同时,其安全性也面临严重的挑战。
However, when workflow brings higher efficiency, its safety is facing serious challenges.
应用推荐