• 随后建立一个通用安全工作流系统模型

    Then a general security WfMS model was constructed.

    youdao

  • 角色的安全访问控制模型基础提出了基于角色控制的安全工作流模型,使文档工作流引擎的驱动下,在网络环境中流向正确用户

    And it presents a secure office workflow based on our designed secure access control model to make the document flow to the right figure user in network by workflow engine.

    youdao

  • 应该了解现有各种企业组件安全机制业务流程业务规则引擎工作流引擎和打包的应用程序

    You should also be aware of existing enterprise components, such as security mechanisms, business process and business rules engines, workflow engines, and packaged applications.

    youdao

  • 如果希望实现安全特殊版本控制工作流两个开发人员可以咖啡馆通过无线网络一起工作,那么可以试试下面的方法。

    If you want to enable a secure, ad-hoc version control workflow, for instance, two guys on a wireless network in a coffee shop, then try out this hack.

    youdao

  • 分配用户角色可以定制安全策略设计实现中,以及定制的工作流和事件升级流中

    Roles assigned to users can be used in the design and implementation of custom security policies, as well as custom workflow and event escalation flows.

    youdao

  • 最后如果信息不够安全工作流是否有效率就不那么重要了。

    Finally, if your information isn't secure and protected, it won't matter how efficient your workflow is.

    youdao

  • 获得安全策略就要定义角色工作流

    After you've got a security policy, define personae and workflows.

    youdao

  • ContentTemplates对象用于存储默认比如所有者作者工作流安全特性等”,以便创建新的内容使用它们。

    Content Templates objects are used to store a set of default values, such as "owner, author, workflow and security features"; to be used when creating new Content.

    youdao

  • 执行工作流期间实施属性安全措施。

    Security on attribute level enforced also during workflow execution.

    youdao

  • 对于即将出现业务工作流web服务标准(该标准中,安全数据需要流经几个系统才能完成事务处理)而言,重要

    This is important for the coming wave of business workflow Web services standards where secured data needs to move through several systems for a transaction to be completely processed.

    youdao

  • 安全角度来看必须所有功能(比如工作流关系层次结构管理)实现属性级特权授权粒度

    From a security perspective, attribute-level granularity of authorization privileges across all functions such as workflow, relationship and hierarchy management must be available for implementation.

    youdao

  • 基本服务可以支持工作流安全审计日志记录通用企业组件集成

    Base services can be implemented to integrate with common enterprise components that support workflow, security, and audit logging.

    youdao

  • 架构需要涉及许多问题安全访问控制服务水平协议,直到业务工作流事件处理信息管理和业务规则。

    The architecture needs to cover a range of directives from security, access control, and service level agreements to business workflow, event processing, and information management and business rules.

    youdao

  • 除了工作流支持外,本文没有涉及到另一个重要问题安全

    Aside from workflow support, another important issue I didn't consider in this article is security.

    youdao

  • XML数据所带来透明性要求应用程序处理工作流的透明性也相应增加从而减少安全状态控制方面的问题

    The increased transparency of XML data requires an increased transparency of application processing workflow in order to mitigate problems from security to state control.

    youdao

  • 基本服务用于支持安全私密性搜索审计日志记录和工作流

    Base services are available to support security and privacy, search, audit logging, and workflow.

    youdao

  • 创建ContentTemplates描述Web内容属性例如工作流安全组件属性。

    Create the content Templates to describe the attributes for your Web content, e.g workflow, security and component attributes.

    youdao

  • 该文安全高效性原则应用迁移工作流迁移决策

    The thesis applies the security and efficiency rule to the migrating decision in migrating workflow.

    youdao

  • 任务节点引入RBAC机制角色属性进行约束以实现对工作流安全存取控制

    Injecting RBAC mechanism into task nodes to restrict the role attribute can secure the access control of the workflow.

    youdao

  • 访问控制机制分布式工作流系统安全策略中的核心内容

    Access control mechanism is an increasingly important content in security policy of distributed workflow management system.

    youdao

  • 笔者首先分析PD M审批工作流存在信息安全问题。

    Firstly, the information security problems of checkup workflow in PDM are discussed.

    youdao

  • 系统开发涉及身份验证、数字签名传输加密工作流定义审批应用电子签章痕迹跟踪等关键安全技术

    Many key security technologies are involved, such as ID authentication, digital signature and transfer encryption, workflow definition, accreditation application, electronic seal and trail trace.

    youdao

  • 传统RBAC访问控制模型已经不能表达复杂工作流安全访问控制约束

    The traditional RBAC model cannot express complicated workflow secure access control constraint.

    youdao

  • 当前工作流并不安全

    The current workflow is not very secure.

    youdao

  • 基于业务活动调度分析提出了时序一致性验证方法确保工作流执行活动之间时间交互安全

    Based on analyzing the schedulability of business activities, a time consistency verification method is put forward to assure safe time interactions between activities during workflow executions.

    youdao

  • 可采用点登陆、PKI认证授权基于角色权限分配策略、利用应用网关访问资源,开发适合本系统工作流访问机制等措施确保信息平台安全

    The main ways to ensure information platform security are presented, which include PKI certification, authentication, role based access control(RBAC), SSO and working flow technology.

    youdao

  • 针对工作流建模复杂性模型的安全存取控制问题提出一种通过建立任务节点路由节点及其依赖关系来创建工作流模型方法

    Due to complexity of modeling workflow and problems of secure access control, a method that makes a workflow model by setting up task nodes, route nodes and their dependency is brought forward.

    youdao

  • 访问控制模型技术研究工作流系统安全机制核心,也是信息安全领域的一个热点问题。

    The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.

    youdao

  • 证明结果表明,密钥封装结构方案能够达到密码工作流模式下要求的接收者安全外部安全

    The proposed scheme can satisfy the receiver security and the external security characters in cryptographic work.

    youdao

  • 工作流带来高效率的同时,安全面临严重的挑战

    However, when workflow brings higher efficiency, its safety is facing serious challenges.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定