• 对于另一个模型可能会希望采用相反方式:以安全策略过程为基础构建技术控制

    For another model, you may wish to have the reverse: technologies and controls built upon the foundation of security policies, and procedures.

    youdao

  • 对于一个模型可能会希望技术基础构建安全策略控制

    For one model, you may wish to have security policies and controls built upon the foundation of technologies.

    youdao

  • EJB技术可以任何EJ b组件方法上实施方法安全策略

    However, EJB technology allows method-level security on any EJB component or method.

    youdao

  • 支持多个策略决策(PDP)技术(包括LDAPTFIM),以便SOAPMQHTTP传输协议强制执行esb安全

    It also supports multiple Policy Decision Point (PDP) technologies including LDAP and TFIM to enforce ESB security for the SOAP, MQ and HTTP transport protocols.

    youdao

  • 本文介绍了一些可以维持系统遵守安全策略工具技术

    This article introduced some tools and techniques that can help you maintain your system's adherence to its security policy.

    youdao

  • 寇林格先生坦承该项技术不够完备,他们需要精确地计算实施策略使车辆安全加入离开哪怕处于车队中间位置。

    The technology is not quite there yet, concedes Mr Coelingh. Strategies still need to be precisely worked out to enable vehicles to join or leave safely, even if they are in the middle of the platoon.

    youdao

  • 然而网络系统安全问题不仅仅技术问题,而是安全策略安全技术安全管理综合过程,是一项系统工程

    However, network security is not only a technical problem but also a comprehensive systems engineering of security strategy, security technology and security management.

    youdao

  • 讨论系统关键技术包括数据处理阅卷算法设计安全控制策略等。

    The critical techniques such as data processing, design of reviewing algorithm and security control strategy are discussed.

    youdao

  • 论文主要研究CIMS系统信息安全策略建立及其技术实现问题。

    The paper mainly studied the establishment and the technical implementation of information security strategy in CIMS.

    youdao

  • 保证安全提高航行的经济性,对船舶的操纵性能提出了更高的要求,因而必要采用新的控制理论技术,研究性能更好的船舶操纵控制策略

    It is becoming more complicated and more difficult. to ensure safety and raise economic it is necessary to adopt the new control theory, control strategy and technique.

    youdao

  • 本文基于风险评估技术主动防御策略引入电力信息网络安全防护中。

    This paper introduces the active defense policy based on risk assessment technology into safe protection of electric power information network.

    youdao

  • 通过恶意代码机理研究实践恶意代码防范技术研究网络安全策略研究提供理论基础指导依据

    The research and its application of the mechanism provide theoretical foundation and guideline for the study of the prevention techniques against the malicious code and the network security policy.

    youdao

  • 本文通过CORBA中间件技术实现基于策略安全信息系统从而解决棘手问题

    In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.

    youdao

  • 保证网络安全核心策略之一也是信息安全技术重要组成部分。

    The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.

    youdao

  • 根据气象网格门户用户管理系统功能需求本文首先研究了网格环境安全需求GSI安全策略安全代理技术

    According to the function needs of user management system of CMAG portal, firstly, we studied the security demand of grid environment, GSI security statics and security proxy technology.

    youdao

  • AC分组密码的设计结合轨迹策略比特技术,以确保算法对差分密码分析和线性密码分析的安全性。

    The cipher design combines the wide trail strategy and bit-slice technology that ensure the resistance AC against differential and linear cryptanalysis.

    youdao

  • 本文加强完善安全技术安全服务安全管理等方面提出建立医院信息系统安全保障体系工作策略方法

    Puts forward the strategy and method of the establishment of safety assurance system from the aspects of strengthening and perfecting the technology, service, management, etc. of safety.

    youdao

  • 信息安全管理单单是管理体制技术问题,而是策略、管理技术有机结合。

    The Information system Security management does not involve only the management system or only the relevant techniques, but includes the relevant strategies, management and techniques.

    youdao

  • 本文讨论了存取控制策略实现方法分析了军用安全模型数据库中的对象保护技术

    The thesis dissertates access control policies and access control implementations, analyzes military security model and object protection in databases.

    youdao

  • 基于安全系统全面信息安全策略网络安全技术网络安全管理两个层次上研究内部网安全

    Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.

    youdao

  • 本文物理安全逻辑安全角度分析了校园网应用比较明显网络安全策略技术

    The article has made the analyses on the network safety tactics and technology obviously existing in the application of the campus network from the angles of the physical safety and logic safety.

    youdao

  • 介绍电力技术监督系统权限安全机制设计策略asp,A DO技术实现安全机制的方法

    This paper introduces a strategy in the privilege safety mechanism in power technology supervise system, and discusses the way through which the mechanism is realized by using ASP and ADO technology.

    youdao

  • 本文简述了网络安全问题定义解决策略安全技术提出了如何建立网络安全管理机制

    This paper summarizes network security definition and the solution policies and the security technology. It also introduced how to construct the security management protocol of a computer network.

    youdao

  • 本文安全策略转换冲突检测技术进行系统而深入的研究。

    This paper mainly focuses on the security policy transformation and conflict detection techniques.

    youdao

  • 介绍安全系统硬件体系结构数据安全访问安全保障策略以及数据加密技术

    It introduces the hardware system configuration, the policy of data security and accessing security as well as the data encrypted technology.

    youdao

  • 安全不是仅仅购买现成产品需要策略人员,架构技术

    Security is not a product that can be purchased off the shelf, but consists of policies, people, processes, and technology

    youdao

  • 该项技术相对于传统技术被动激发策略采取主动检测策略传统网络安全技术一个良好补充

    Compared to the passive strategy of traditional network security technologies, it takes initial detect strategy, which is a good supplement to traditional technologies.

    youdao

  • 本文针对关节式移动机器人斜面上运动时稳定性安全要求对其进行动力学分析,利用传感器融合技术机器人进行局部定位,提出它的基于模糊逻辑控制策略

    Fuzzy logic based motion control approach was proposed, using sensor fusion for robot local location, aimed at the requirement of stability and safety for articulated mobile robot moving on slope.

    youdao

  • 对系统安全策略研究庞大的工程其中基本也是最关键的研究课题主要包括大部分数据加密技术研究,一个是对身份认证技术的研究。

    Although it's a huge project, the most fundamental and critical theme includes two parts, one is the research on data encryption, the other is on certification authentication.

    youdao

  • 对系统安全策略研究庞大的工程其中基本也是最关键的研究课题主要包括大部分数据加密技术研究,一个是对身份认证技术的研究。

    Although it's a huge project, the most fundamental and critical theme includes two parts, one is the research on data encryption, the other is on certification authentication.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定