• 首先在分析嵌入式实时数据库安全要求基础给出了一个安全控制模型

    This passage bulids a secure control model with three layers on the ERTDB security requirements firstly, and then proposes a secure optimistic concurrency control strategy.

    youdao

  • 本文SSLSET两个电子商务安全协议比较,针对不同安全需要,构造一个分级安全控制模型,较好地改进了SET协议。

    This article compares SSL with SET protocol, and constructs a hierarchical safety control model to suit for different safety requirements, this model will improve SET protocol.

    youdao

  • 对于另一个模型可能会希望采用相反方式:以安全策略过程为基础构建技术控制

    For another model, you may wish to have the reverse: technologies and controls built upon the foundation of security policies, and procedures.

    youdao

  • 对于一个模型可能会希望技术基础构建安全策略控制

    For one model, you may wish to have security policies and controls built upon the foundation of technologies.

    youdao

  • SCA单个服务集合业务解决方案的组装提供了一个模型控制解决方案的各个方面,访问方法安全

    SCA also provides a model for the assembly of business solutions from collections of individual services, with control over aspects of the solution such as access methods and security.

    youdao

  • 由于合作伙伴组织员工角色合作伙伴组织控制因此最好采用联合安全模型

    Because the employees and roles of the partner organizations are controlled by the partner organization, it's best to keep the federated security model.

    youdao

  • 所有这些内容控制系统总体安全模型

    All these govern the overall security model of the system.

    youdao

  • 因此管理保留了访问模型特定集合控制就阻止了潜在安全入侵

    Thus, management retains control over who can access each specific set of models, which prevents potential security violations.

    youdao

  • 对于交付模型使用者部署的应用程序操作系统硬件软件存储网络控制能力不同,这会影响安全策略。

    It is influenced by how much control a consumer can have over deployed applications, operating systems, hardware, software, storage and networking for a cloud delivery model.

    youdao

  • 区分上述用户安全访问控制模型

    A security and access control model that distinguishes between these two classes of users.

    youdao

  • LotusNotes服务实例包括Domino安全模型(Security Model),可以进行用户身份验证访问控制加密

    Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.

    youdao

  • 为了应对挑战,Max同事一起,以分布式信息流控制(DecentralizedInformationFlow Control, DIFC)模型为基础,开发了开源web应用安全基础设施flume

    To respond to these challenges, Max and his colleagues have developed Flume, an open source web application security infrastructure based on a Decentralized Information Flow Control (DFIC) model.

    youdao

  • 访问控制模型信息安全领域研究重点之一。

    The research of access control model is a topic of information security area.

    youdao

  • 导入包含安全模型文件之前使用AdministrationConsole将包含多维数据集模型的文件导入InfoSphere Warehouse控制数据库

    Before you import the file containing your security model, import the file containing your cube model into the InfoSphere Warehouse control database using the Administration Console.

    youdao

  • 基于任务授权控制TBAC)则是以任务为中心,采用动态授权主动安全模型

    Task based access control (TBAC) is an initiative security model, where task is focus of work and dynamic authorization is used.

    youdao

  • 模型透明计算机系统基础,利用透明计算技术计算机内部安全问题进行控制

    To deal with worsening network security problems, a trusted computer system model for network applications was developed based on the transparence computing paradigm.

    youdao

  • 最后使用此策略构造了一个基于属性证书授权访问控制模型,能够灵活方便实现电子政务中的安全访问控制

    At last, based on attribute certificate, a model is constructed to solve the authorization and access-control problem, to realize secure access-control in the electronic government.

    youdao

  • 采用消息过滤算法可以在支持对象模型多级安全系统实现强制访问控制

    Message filter algorithms can implement mandatory access control in the multilevel secure systems with an object oriented model.

    youdao

  • 安全信息系统应用中,传统基于角色访问控制模型不能用户过滤业务数据容易导致数据失密

    In the application of secure information systems, the traditional role-based access control model can not filter business data for users, which easily results in secret data leakage.

    youdao

  • 本文讨论了存取控制策略实现方法分析了军用安全模型数据库中的对象保护技术。

    The thesis dissertates access control policies and access control implementations, analyzes military security model and object protection in databases.

    youdao

  • 该文首先通过随机不可控需求控制问题转化为安全库存设置问题的方法建立了库存系统的仿真模型

    A simulation model of inventory system is set up through turning the stochastic and uncontrolled demand control problem into the method of setting up safe inventory.

    youdao

  • 给出电力市场环境基于电压安全的最预测控制模型算法。

    Proposes the model of optimal preventive control based on voltage security in electricity markets.

    youdao

  • 文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    youdao

  • 模型依赖于消息安全处理模型访问控制模型

    The implement of the model depends on a message processing security model and an access control model.

    youdao

  • 这个访问控制模型保护企业资源安全,同时又能实现协作环境内的资源共享

    This AC model can protect the assets and share the resource in collaborative environment.

    youdao

  • 因此,在这样一个模型下,必须内网所有实体对象进行更加全面、颗粒度更小的安全管理以及控制

    So beneath this security attacking model of inner-mesh, we have to get more special security control management for all the component points and participants.

    youdao

  • 利用激光皮肤中的传导应用红外传感器探测皮肤温度原理设计激光美容手术温度控制模型控制激光手术安全

    Utilize the theory of laser conducting among skin and use infrared sensor to detect the skin temperature, design the laser operation temperature control model to improve the safety of laser operation.

    youdao

  • 多级安全数据库安全策略需要各种模型表达访问控制模型其中之一

    Security policy of multilevel security DBMS is expressed by many models. One of them is access control model.

    youdao

  • 本文讨论汽车自适应巡航控制跟随模式两个问题跟随模式安全车距的确定,二是跟随模式控制模型的建立。

    This paper has discussed two aspects concerning the following mode of vehicle ACC, one is the safe distance of the following mode, the other is the control modeling of this mode.

    youdao

  • 访问控制模型技术研究工作流系统安全机制核心,也是信息安全领域的一个热点问题。

    The research of access control model and technology has become the focus of the security mechanism and the emphasis of information security area.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定