对于另一个模型,您可能会希望采用相反的方式:以安全策略和过程为基础构建技术和控制。
For another model, you may wish to have the reverse: technologies and controls built upon the foundation of security policies, and procedures.
对于一个模型,您可能会希望以技术为基础构建安全策略和控制。
For one model, you may wish to have security policies and controls built upon the foundation of technologies.
EJB技术可以在任何EJ b组件或方法上实施方法级的安全策略。
However, EJB technology allows method-level security on any EJB component or method.
它还支持多个策略决策点(PDP)技术(包括LDAP和TFIM),以便为SOAP、MQ和HTTP传输协议强制执行esb安全。
It also supports multiple Policy Decision Point (PDP) technologies including LDAP and TFIM to enforce ESB security for the SOAP, MQ and HTTP transport protocols.
本文介绍了一些可以帮您维持系统遵守安全性策略的工具和技术。
This article introduced some tools and techniques that can help you maintain your system's adherence to its security policy.
寇林格先生坦承该项技术尚不够完备,他们需要精确地计算出实施策略,使车辆安全地加入或离开,哪怕它处于车队中间位置。
The technology is not quite there yet, concedes Mr Coelingh. Strategies still need to be precisely worked out to enable vehicles to join or leave safely, even if they are in the middle of the platoon.
然而,网络系统安全问题不仅仅是技术的问题,而是安全策略、安全技术与安全管理的综合过程,是一项系统工程。
However, network security is not only a technical problem but also a comprehensive systems engineering of security strategy, security technology and security management.
讨论了系统的关键技术,包括数据的处理、阅卷算法的设计和安全控制策略等。
The critical techniques such as data processing, design of reviewing algorithm and security control strategy are discussed.
本论文主要研究了CIMS系统中信息安全策略的建立及其技术实现问题。
The paper mainly studied the establishment and the technical implementation of information security strategy in CIMS.
为保证安全,提高航行的经济性,对船舶的操纵性能提出了更高的要求,因而有必要采用新的控制理论和技术,研究性能更好的船舶操纵控制策略。
It is becoming more complicated and more difficult. to ensure safety and raise economic it is necessary to adopt the new control theory, control strategy and technique.
本文将基于风险评估技术的主动防御策略引入电力信息网络的安全防护中。
This paper introduces the active defense policy based on risk assessment technology into safe protection of electric power information network.
通过对恶意代码机理研究和实践,为恶意代码防范技术研究和网络安全策略研究提供理论基础和指导依据。
The research and its application of the mechanism provide theoretical foundation and guideline for the study of the prevention techniques against the malicious code and the network security policy.
本文通过CORBA中间件技术,来实现基于策略的安全信息系统,从而解决这一棘手问题。
In this article, the authors present a solution based on CORBA technology to realize policy security information system. We solve the difficulty question totally.
它是保证网络安全的核心策略之一,也是信息安全技术的重要组成部分。
The Access Control is one of the core strategies of the network security, as well as a major component of information safety technology.
根据气象网格门户用户管理系统的功能需求,本文首先研究了网格环境的安全需求、GSI安全策略及安全代理技术。
According to the function needs of user management system of CMAG portal, firstly, we studied the security demand of grid environment, GSI security statics and security proxy technology.
AC分组密码的设计结合了宽轨迹策略和比特块技术,以确保算法对差分密码分析和线性密码分析的安全性。
The cipher design combines the wide trail strategy and bit-slice technology that ensure the resistance AC against differential and linear cryptanalysis.
本文从加强和完善安全技术、安全服务、安全管理等方面提出了建立医院信息系统安全保障体系的工作策略和方法。
Puts forward the strategy and method of the establishment of safety assurance system from the aspects of strengthening and perfecting the technology, service, management, etc. of safety.
信息安全管理不单单是管理体制或技术问题,而是策略、管理和技术的有机结合。
The Information system Security management does not involve only the management system or only the relevant techniques, but includes the relevant strategies, management and techniques.
本文讨论了存取控制的策略、实现方法,分析了军用安全模型和数据库中的对象保护技术。
The thesis dissertates access control policies and access control implementations, analyzes military security model and object protection in databases.
基于安全系统的全面信息安全策略,从网络安全技术和网络安全管理这两个层次上研究内部网的安全性。
Based on comprehensive information security policy of security system, this paper studies the security of local Area network by network security technology and network security management.
本文从物理安全和逻辑安全角度分析了校园网应用比较明显的网络安全策略和技术。
The article has made the analyses on the network safety tactics and technology obviously existing in the application of the campus network from the angles of the physical safety and logic safety.
介绍电力技术监督系统的权限安全机制设计策略及用asp,A DO技术实现安全机制的方法。
This paper introduces a strategy in the privilege safety mechanism in power technology supervise system, and discusses the way through which the mechanism is realized by using ASP and ADO technology.
本文简述了网络安全问题的定义及解决策略和安全技术,并提出了如何建立网络的安全管理机制。
This paper summarizes network security definition and the solution policies and the security technology. It also introduced how to construct the security management protocol of a computer network.
本文对安全策略转换和冲突检测技术进行了系统而深入的研究。
This paper mainly focuses on the security policy transformation and conflict detection techniques.
介绍了安全系统的硬件体系结构、数据安全和访问安全的保障策略以及数据加密技术。
It introduces the hardware system configuration, the policy of data security and accessing security as well as the data encrypted technology.
安全,不是仅仅购买一款现成的产品,还需要策略,人员,架构和技术…
Security is not a product that can be purchased off the shelf, but consists of policies, people, processes, and technology…
该项技术相对于传统技术的被动激发策略,它采取的是主动检测策略,对传统的网络安全技术是一个良好的补充。
Compared to the passive strategy of traditional network security technologies, it takes initial detect strategy, which is a good supplement to traditional technologies.
本文针对关节式移动机器人在斜面上运动时稳定性和安全性的要求对其进行动力学分析,利用传感器融合技术对机器人进行局部定位,提出了它的基于模糊逻辑的控制策略。
Fuzzy logic based motion control approach was proposed, using sensor fusion for robot local location, aimed at the requirement of stability and safety for articulated mobile robot moving on slope.
对系统安全策略的研究是一项庞大的工程,但其中最基本也是最关键的研究课题主要包括两大部分,一是对数据加密技术的研究,另一个是对身份认证技术的研究。
Although it's a huge project, the most fundamental and critical theme includes two parts, one is the research on data encryption, the other is on certification authentication.
对系统安全策略的研究是一项庞大的工程,但其中最基本也是最关键的研究课题主要包括两大部分,一是对数据加密技术的研究,另一个是对身份认证技术的研究。
Although it's a huge project, the most fundamental and critical theme includes two parts, one is the research on data encryption, the other is on certification authentication.
应用推荐